0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000180)={0x7, 0x88f, 0x7, 0x0, 0x0, [{{r1}}, {{r2}, 0xffff}, {{r3}, 0x5}, {{r4}, 0xfffffffffffffffd}, {{r5}, 0x6}, {{r6}, 0x100000000}, {{r7}, 0x1}]}) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = dup2(r8, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r10, 0x4b44, &(0x7f0000000100)=""/103) 13:26:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = socket$inet6(0xa, 0x3, 0x3a) r4 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) ioctl$SIOCGETLINKNAME(r4, 0x89e0, &(0x7f0000000000)={0x1, 0x3}) ioctl$GIO_SCRNMAP(r2, 0x4b33, &(0x7f0000000100)=""/103) 13:26:10 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x9) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet6_int(r2, 0x29, 0x4c, &(0x7f0000000000)=0x1, 0x4) ioctl$GIO_SCRNMAP(r3, 0x4b33, &(0x7f0000000100)=""/103) 13:26:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETLINK(r1, 0x400454cd, 0x338) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x701100, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b44, &(0x7f0000000140)=""/133) 13:26:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003, 0x0, 0x5}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='auxv\x00') sendfile(0xffffffffffffffff, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="446664f514b66cc4d945b73a9dc486c56de665bb40b81eb855c871e71119b29da9627ab3c9a5ccc3812ea98f6738319296", @ANYRES16=r3, @ANYRES16=r2], 0x3}, 0x1, 0x0, 0x0, 0x44000}, 0x20004811) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010028bd7000fedbdf25010000000c00040007000400000000000c0006000100000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x10) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x10001, 0x0) r5 = socket(0x18, 0x0, 0x0) connect$rxrpc(r5, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000128bd700075bd16a2413a00000000000000abf133ffdbdf25010000000c000500", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="0c000300faffffffffffffff0c00080009000000000000000c0006000300000000000000"], 0x58}, 0x1, 0x0, 0x0, 0x4000040}, 0x841) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, r3, 0x8, 0x70bd29, 0x25dfdbfb, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xfffffffffffff000}]}, 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x51) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, r3, 0x10, 0x70bd28, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4004114}, 0x4008040) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, r3, 0x8, 0x70bd27, 0x25dfdbfc, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x20}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x28}, 0x1, 0x0, 0x0, 0x50}, 0x4000084) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r6, 0x4b31, &(0x7f0000000100)=""/103) 13:26:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000180)=0x6) write$FUSE_STATFS(r1, &(0x7f0000000000)={0x60, 0xfffffffffffffffe, 0x5, {{0x10000, 0x3ff, 0x0, 0x0, 0x1f, 0x0, 0xc1e, 0x5}}}, 0x60) fchmod(0xffffffffffffffff, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r4 = socket(0xa, 0x1, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r4, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB="200000ede3000000840000000200"/28, @ANYRES32=r6], 0x20}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000080)={r6, @in6={{0xa, 0x4e23, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x100}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000001c0)={r6, @in6={{0xa, 0x4e22, 0x3, @local, 0x3}}, 0x28, 0x6}, &(0x7f0000000280)=0x90) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$vim2m_VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000080)={0xff, 0x2, 0x4, 0x2000, 0x7fff, {0x77359400}, {0x5, 0x1, 0x3, 0x6, 0x20, 0x1, "c387bef5"}, 0x7f, 0x3, @offset=0x3026, 0x178800, 0x0, r1}) ioctl$GIO_SCRNMAP(r7, 0x4b44, &(0x7f0000000100)=""/103) 13:26:11 executing program 0: socket$inet6(0xa, 0xa, 0x401) r0 = open(&(0x7f0000000240)='./file0/bus\x00', 0x140, 0x100) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000001180)=""/4098) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$GIO_SCRNMAP(r3, 0x4b44, &(0x7f0000000100)=""/103) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000040)={0x0, @reserved}) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000000)) 13:26:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f00000000c0)={0x5765ad3d296b1973, 0x0, 0x101, 0x2, {0xf824, 0x1, 0x5, 0x6}}) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f0000000080)={0x15c, 0x8, &(0x7f0000000180)}) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r3, 0x4b31, &(0x7f0000000100)=""/103) r4 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r4, 0x0) r5 = socket(0xa, 0x1, 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r5, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB="200000ede3000000840000000200"/28, @ANYRES32=r7], 0x20}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000080)={r7, @in6={{0xa, 0x4e23, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x100}}}, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000580)={r7, @in6={{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x20}, 0x8}}}, 0x84) write$P9_RSTATFS(r4, &(0x7f0000000000)={0x43, 0x9, 0x2, {0x7f, 0x800, 0x20, 0x47, 0x3a, 0x8000, 0x5, 0x7, 0x10001}}, 0x43) 13:26:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000000)) fchmod(0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0100000000000000000002"], 0x20}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x4a}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r8, @ANYBLOB="0000400000000002280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@ipv4_newaddr={0x30, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0xa0, 0x0, r8}, [@IFA_LOCAL={0x8, 0x2, @multicast2}, @IFA_BROADCAST={0x8, 0x4, @broadcast}, @IFA_FLAGS={0x8, 0x8, 0x400}]}, 0x30}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x58, r4, 0x1, 0x70bd26, 0x25dfdbfc, {}, [{{0x8, 0x1, r8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x4004}, 0x40080) r9 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r9, 0x4b33, &(0x7f0000000100)=""/103) 13:26:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000000)=0x63, 0x2) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x4a}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r5, @ANYBLOB="0000400000000002280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@ipv4_newaddr={0x30, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0xa0, 0x0, r5}, [@IFA_LOCAL={0x8, 0x2, @multicast2}, @IFA_BROADCAST={0x8, 0x4, @broadcast}, @IFA_FLAGS={0x8, 0x8, 0x400}]}, 0x30}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x4a}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r9, @ANYBLOB="0000400000000002280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@ipv4_newaddr={0x30, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0xa0, 0x0, r9}, [@IFA_LOCAL={0x8, 0x2, @multicast2}, @IFA_BROADCAST={0x8, 0x4, @broadcast}, @IFA_FLAGS={0x8, 0x8, 0x400}]}, 0x30}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000002280)={&(0x7f0000000040), 0xc, &(0x7f0000002240)={&(0x7f0000001e80)={0x39c, 0x0, 0x4, 0x70bd27, 0x25dfdbfd, {}, [{{0x8}, {0xac, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x14c, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x7}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x24, 0x4, [{0x0, 0x4, 0x7, 0x8}, {0x5, 0x0, 0xf7, 0x1a36}, {0xe600, 0x4c, 0x6, 0x81}, {0x8, 0x7f, 0x7, 0x6}]}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0xfffffffc}}}]}}, {{0x8}, {0x4}}, {{0x8}, {0x16c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0xc, 0x4, [{0x401, 0x8, 0x27, 0x800}]}}}]}}]}, 0x39c}}, 0x24000000) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) [ 1459.978198] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 13:26:11 executing program 0: r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)={0x3c, r2, 0x1, 0x0, 0x0, {0x5}, [{@nsim={{0x28, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0xe0, r2, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}]}, 0xe0}, 0x1, 0x0, 0x0, 0x22000000}, 0x90) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r5 = dup2(r3, r4) r6 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x1d2) fchmod(r6, 0x0) r7 = socket$inet6(0xa, 0x3, 0x3a) r8 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r7, r8, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0xffffffffffffff00) r9 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$TIPC_NODE_RECVQ_DEPTH(r5, 0x10f, 0x83, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$GIO_SCRNMAP(r9, 0x4b44, &(0x7f0000000100)=""/103) [ 1460.020546] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1460.060569] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1460.071657] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1460.123922] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1460.138146] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1460.155748] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1460.197361] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 13:26:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000080)={'macvlan0\x00', {0x2, 0x4e21, @loopback}}) r2 = dup2(r0, r0) ioctl$sock_ifreq(r2, 0x891b, &(0x7f0000000000)={'hsr0\x00', @ifru_flags=0x2000}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r3, 0x4b44, &(0x7f0000000100)=""/103) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=""/174, 0xae) 13:26:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x3b) fchmod(r1, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f0000000180)) r2 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r3, 0x4b33, &(0x7f0000000100)=""/103) 13:26:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='\'+@\'[%[%$,%.-(\x00', r2}, 0x10) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x50, 0x2, 0x6, 0x3, 0x0, 0x0, {0xe, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000004}, 0x1804) ioctl$GIO_SCRNMAP(r3, 0x4b44, &(0x7f0000000100)=""/103) 13:26:12 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r1 = eventfd2(0x4, 0x1000) r2 = dup2(r0, r1) r3 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180)='NLBL_UNLBL\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80020}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYRES64=r5, @ANYRES16=r3], 0xd0}, 0x1, 0x0, 0x0, 0x8090}, 0x44) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x70, r3, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @dev={0xfe, 0x80, [], 0x34}}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'macvlan1\x00'}, @NLBL_UNLABEL_A_SECCTX={0x32, 0x7, 'system_u:object_r:systemd_passwd_var_run_t:s0\x00'}]}, 0x70}, 0x1, 0x0, 0x0, 0x36ac806ba0a4b133}, 0x40000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r6, 0x4b30, &(0x7f0000000100)=""/103) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x1) 13:26:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b44, &(0x7f0000000100)=""/103) r3 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) fchmod(r4, 0x10) ioctl$VIDIOC_G_FBUF(r3, 0x8030560a, &(0x7f00000000c0)={0x11c, 0x1c, &(0x7f0000000000)="b522b90baaef6ca6b2a6144c9c834e46a0521231d36142e947efd26bfeb5badcf0885c410bd8fba3ef4173ae5c749ec0b3daef71c194512b15ed7cb79920a8cd3e7f1316c988801fd9c470aeebc520a5f4f7ef671254d7b4cdeca759cc30049000a507570854593f4842df54908382aa615a15ac09345df361c878cf5dd3b546a162ef139bb5423c8b8185e9370214839f", {0x5, 0x8, 0x31324d59, 0x6, 0x1, 0x6, 0xa, 0x6}}) 13:26:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) r3 = socket$inet6(0xa, 0x3, 0x3a) r4 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) ioctl$KVM_SET_CPUID2(r4, 0x4008ae90, &(0x7f0000000000)={0x6, 0x0, [{0x80000007, 0xfff, 0x3, 0x0, 0x2, 0x81, 0x8}, {0x80000008, 0x422b, 0x6, 0x80, 0x0, 0x2, 0x4}, {0x1, 0x0, 0xd, 0x0, 0x210, 0x0, 0x6}, {0xc0000000, 0x4, 0x1, 0x7, 0x6d280000, 0x10000, 0x8001}, {0x80000019, 0x4, 0x2, 0x2, 0x681, 0xfffffffa, 0xf4}, {0x0, 0x100, 0x6, 0x1, 0x1a9, 0x9, 0x4}]}) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x2110, r0, 0x98b68000) 13:26:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = socket$inet6(0xa, 0x3, 0x3a) r4 = open(&(0x7f0000000240)='./file0/bus\x00', 0x121002, 0x2) sendfile(r3, r4, 0x0, 0x0) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r6 = socket(0x6d, 0x5, 0x807fff) close(r6) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r6, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB="200000ede3000000840000000200"/28, @ANYRES32=r8], 0x20}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r5, 0x84, 0x5, &(0x7f0000000080)={r8, @in6={{0xa, 0x4e23, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x100}}}, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000180)={r8, @in6={{0xa, 0x4e20, 0x8bed, @ipv4={[], [], @private=0xa010101}, 0x40}}, [0xfff, 0x7f, 0x81, 0x2, 0x401, 0x0, 0x9, 0x7, 0x100, 0x0, 0xfffffffffffffffb, 0x10000, 0x0, 0x80000000000, 0x1]}, &(0x7f0000000040)=0x100) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000080)={r9, 0x7}, 0x8) r10 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x400000, 0x0) mmap$dsp(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000004, 0x100010, r10, 0x0) 13:26:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r2 = openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) r3 = dup2(r2, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/31}) ioctl$GIO_SCRNMAP(r4, 0x4b30, &(0x7f0000000100)=""/103) [ 1460.660398] audit: type=1800 audit(1593177972.294:115): pid=20394 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16553 res=0 13:26:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_DUMPABLE(0x3) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b31, &(0x7f0000000100)=""/103) sendto$inet6(r0, &(0x7f0000000000)="04dcd29e6e2d032344d17eb6cab6ed4b0390d0e374688f6ae3be7a255d113c5d3eed2dac21eb1639f8a4466eda553b144adf46e6a9a5ca5f1e629deff9c71b7807cbfde885eb409d0267a974e5085dc7a7d7aacd4525d13cea11ce4dcc4915a31fc90e9f57a9e851e8a149ec35aac0ebb4bfcef1453becd002991f7f89275ceb0234bc2c31257c41fbed826f7f5e84c592fa63fc2f76111a9081d6", 0x9b, 0x92, &(0x7f00000000c0)={0xa, 0x4e21, 0xff, @local, 0x3}, 0x1c) 13:26:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b31, &(0x7f0000000100)=""/103) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000000)={0x0, 0xfffffffd, 0x80000000, 0x5, 0x17, "4c33154472c5bf9a9b1b5cc43c88ee81869981"}) 13:26:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) ioctl$KVM_DIRTY_TLB(r3, 0x4010aeaa, &(0x7f0000000000)={0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r4, 0x4b33, &(0x7f0000000100)=""/103) 13:26:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1400, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x4a}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r7, @ANYBLOB="0000400000000002280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@ipv4_newaddr={0x30, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0xa0, 0x0, r7}, [@IFA_LOCAL={0x8, 0x2, @multicast2}, @IFA_BROADCAST={0x8, 0x4, @broadcast}, @IFA_FLAGS={0x8, 0x8, 0x400}]}, 0x30}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={r7, @empty, @dev={0xac, 0x14, 0x14, 0x10}}, 0xc) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) [ 1460.891455] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 13:26:12 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r0, 0x4b31, &(0x7f0000000100)=""/103) 13:26:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_PCM_IOCTL_HWSYNC(0xffffffffffffffff, 0x4122, 0x0) r1 = dup2(r0, r0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) sync() setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "e7a02cf66f16d67f", "a57173356eca296f28a73ce188cfc830728957a2c9aa773ba4f48a872bde8fc5", "ba7c0605", "17ad2a62e9ad4654"}, 0x38) [ 1460.993931] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 13:26:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f00000000c0)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6(0xa, 0x3, 0x3a) r4 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000080)=0xf0, 0x4) ioctl$GIO_SCRNMAP(r2, 0x4b33, &(0x7f0000000000)=""/103) r5 = socket$inet6(0xa, 0x3, 0x3a) r6 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x0) r7 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r7, 0x0) r8 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x10) fchmod(r8, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r8, 0x6431) 13:26:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1000, 0x2040) r4 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r4, 0x0) ioctl$TIOCSCTTY(r4, 0x540e, 0x8ff) ioctl$sock_inet6_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000040)) 13:26:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_PCM_IOCTL_HWSYNC(0xffffffffffffffff, 0x4122, 0x0) r1 = dup2(r0, r0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) sync() setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "e7a02cf66f16d67f", "a57173356eca296f28a73ce188cfc830728957a2c9aa773ba4f48a872bde8fc5", "ba7c0605", "17ad2a62e9ad4654"}, 0x38) 13:26:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b33, &(0x7f0000000100)=""/103) r3 = socket$inet6(0xa, 0x3, 0x3a) r4 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) sendmsg$NFT_MSG_GETSET(r4, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0xa, 0xa, 0x3, 0x0, 0x0, {0xc, 0x0, 0x9}, [@NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 13:26:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) pipe(&(0x7f0000000280)={0xffffffffffffffff}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) ptrace$pokeuser(0x6, r4, 0x9246, 0x0) r5 = syz_open_procfs(r4, &(0x7f0000000000)='fdinfo/3\x00') accept4$inet(r5, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10, 0x800) 13:26:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) lseek(r0, 0x7, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f0000000040)={0xffffffffffffffff, 0x1, 0xffffffff, 0x1, 0x5}) ioctl$GIO_SCRNMAP(r3, 0x4b30, &(0x7f0000000100)=""/103) 13:26:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_PCM_IOCTL_HWSYNC(0xffffffffffffffff, 0x4122, 0x0) r1 = dup2(r0, r0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) sync() setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "e7a02cf66f16d67f", "a57173356eca296f28a73ce188cfc830728957a2c9aa773ba4f48a872bde8fc5", "ba7c0605", "17ad2a62e9ad4654"}, 0x38) 13:26:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x101000, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/nvram\x00', 0x430f01, 0x0) setsockopt$inet6_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000080)=@gcm_256={{0x304}, "ab81c16e33bc72d7", "b21b5cfea90a55b5d82d0a7502409b99d9ab807b6d436b0f211016a49005c424", "29e27010", "1cdfc40a3a4c3414"}, 0x38) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ioctl$FS_IOC_MEASURE_VERITY(r3, 0xc0046686, &(0x7f0000000280)=ANY=[@ANYBLOB="0100e100e30b3052f984b287e243919be27e6251762ba5fd86cb2c63cec2fb893f25709b192cf38d3df3180000006d070000000000000022c7fcca6bd02c1d5a81906062d15a7715d5bc3d1d8b00eff40b8ad10c77d4716bc700a406ad580b0cab1bfc7fa0aff93ed10676ef56e18bb6229aac1f8110ca9c95e9bfd594480ec9d6b9e8162bbfe53cd49cd957273b7c68ec68bd523a8086622012d233e076c51f2ae1ced2d0867e31f7e38990456d16dfe99a05f8d5aaf84b0767e3d7c883bf6f8a88d23e78dcbbdd34d589a39d74431747afd78dfb694a018922fdd5ddd30bf6aee93a687baff04bd920d6450500000096a61e25"]) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snd/seq\x00', 0x2000) fcntl$getown(r4, 0x9) r5 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) ptrace$pokeuser(0x6, r7, 0x9246, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000073014300000000009500000000000000f4ff9b31ae30545d507c8a7a590f571fd2ae40b66b870ba131653ad685a7b665cb3ed0959f82813d86ca2d6f46ad69eb44075929404fe6aac5ab0dfc5d92d9be23cf45a630f1f2be04cc8e8fa5d93046af3b91181b84b9fe"], &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000008c0)={r8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r7, r5, 0x0, 0x6, &(0x7f0000000180)=')-,|+\x00', r8}, 0x30) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000200)={[], 0xa898, 0x0, 0x1, 0x3ff, 0x1, r9}) ioctl$GIO_SCRNMAP(r6, 0x4b33, &(0x7f0000000100)=""/103) 13:26:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = socket$inet6(0xa, 0x3, 0x3a) r4 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r4, 0x800442d3, &(0x7f0000000000)={0x1ff, 0xe720, 0xd6ef, @empty, 'veth0_to_batadv\x00'}) 13:26:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) fsetxattr(r3, &(0x7f0000000000)=@known='com.apple.system.Security\x00', &(0x7f0000000040)='+.:\x00', 0x4, 0x3) syz_open_dev$tty1(0xc, 0x4, 0x1) 13:26:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) pipe(&(0x7f0000000280)={0xffffffffffffffff}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) ptrace$pokeuser(0x6, r4, 0x9246, 0x0) timer_create(0x2, &(0x7f0000000000)={0x0, 0x34, 0x0, @thr={&(0x7f0000000180)="848a9f076722eb33b4ad6bc2ed4df52c0054deede1cfbd47cff5269276828884af94b196d3948246997bf0260de7fc686930d01971727460f78b11601a1df3991931fbd70604e9817963743b8b4082b4f25ada704115ace1d47f8bf68be1099c58dd263d8983479f09e7317ed0c1cc6ade8e2ff8af", &(0x7f0000000200)="756d08a4171215f848fe85144214ceed008b640c275aca5eb1198c348dde4fa92aef678d522f87c868760903193c905c0411a98413fafbf1a8d8e550adcc7f329573cc"}}, &(0x7f0000000040)) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) 13:26:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) fdatasync(r3) ioctl$GIO_SCRNMAP(r2, 0x4b33, &(0x7f0000000100)=""/103) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) fcntl$F_SET_RW_HINT(r4, 0x40c, &(0x7f0000000000)=0x5) 13:26:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000001ac0)={@private0, 0x0}, &(0x7f0000001b00)=0x14) sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000037c0)=[{{0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000000)="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", 0xfa}, {&(0x7f0000000180)="5073a4dbe763c39c8279f0778cd92fa9c2845071cb0e8c67d5081766c24bb2e17cacb8dea7c5e0b6e286253cf455f58989367cb2ff1e4aa586021282ebfa193769f8563ac52cfbd076c22dc9f9619be46c759324cfd6ba107720be079144a777448af9d7b184c8bff267d7708586480ed9b2f76a84bc62c3d2029e768e7b8b6e3b3a2e742cda04e0f497888563577365e2d162f694099399a110c46efa86f5b5ad903749de1017a5a0e7f9abcf99b661899914064a37997054e1bc9c4f9b", 0xbe}, {&(0x7f0000000240)="c7c3a094ef71d6ce95974d33f04cf92c3bf79af73c7f22abaff742d5379840f93b37d871fc9f60a502f4a16274db04a97257c59e3565f1538fe6e27836f2837f6444ebe9702cdf70318abe783baee1d1656cecda6c7805b05067f003f0e656048ce3028a57431a4525b24155", 0x6c}, {&(0x7f00000002c0)="1003752155", 0x5}, {&(0x7f0000000300)="f373e2294d9eda08848427258ae56ef8710535a8f5b8c0498d3ea60acc8670a8438844ccfaa9ae4243669b10709223dff2a65739ac5f13964065c4ca1413fca268d6e45b98fcf868cb543caef00c75bd701c6d768cf8257368624739229b88ed9a1f8a009a0a814de7a26089df1bd57e75660e0e82c1217274e09afe91900fcd29b9d0b8bb7b418f2212e2c5f1832d2ee2dea4387441daecfeaa94a035f9f4d2afa96ad7f34aa9f9e69e45612728bba4b465fc12749e98334b43c5690235ccc91380dc68c54d7ceb94ff28ddc83bf4c4685663909c7fbcbedeb6c863434dcc4c16c6d869aa574af63f512bac94f6143d7b7ac22a4db8aa9fda", 0xf9}, {&(0x7f0000000400)="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", 0x1000}], 0x6, &(0x7f0000001480)=[@rthdr={{0xb8, 0x29, 0x39, {0x33, 0x14, 0x2, 0x7, 0x0, [@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev={0xfe, 0x80, [], 0x19}, @empty, @private1={0xfc, 0x1, [], 0x1}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02']}}}, @hopopts={{0x58, 0x29, 0x36, {0x3a, 0x7, [], [@calipso={0x7, 0x18, {0x1, 0x4, 0x80, 0x80, [0x6, 0x7]}}, @enc_lim={0x4, 0x1, 0x80}, @hao={0xc9, 0x10, @mcast2}, @jumbo={0xc2, 0x4, 0x738}, @jumbo={0xc2, 0x4, 0x6}]}}}, @rthdrdstopts={{0x30, 0x29, 0x37, {0x16, 0x2, [], [@pad1, @enc_lim={0x4, 0x1, 0x7}, @jumbo={0xc2, 0x4, 0x8}, @calipso={0x7, 0x8, {0x3, 0x0, 0x9, 0x12}}]}}}], 0x140}}, {{&(0x7f00000015c0)={0xa, 0x4e21, 0x1936, @empty, 0x80000000}, 0x1c, &(0x7f0000001a40)=[{&(0x7f0000001600)="dfa92c8a15568842f5ddb632a2fabb96b14dc34c1cce6f7b1e5cf355817ddfa9f1aa5f7e95e040cdbcd21c9424b5e6af9e8b4ac03b71ae7de41b5ed23eab6666d85f746bdef356f40119196955d3709db49a28e9c88703628d0ec7f1802fe236c8dbad670817760fd46a4719a95da81964173c7ac74a0c52cebabf187f43b5fd1998e3166c71d529f30a67e118c395ef7fbc949644ba19e6d50f9bd0e1c4b6d0303c515ca9a29542fda4b2826bef7ef72440fb6cf158737a02b91bad", 0xbc}, {&(0x7f00000016c0)="249126da3ddd7932d27770fdfc2640a64215d2137cfdde6f1b5e18f546142830e0540053b4f3cf6d59b0707357c120f72b6e96d2104a1d977f0460e41ce5f617718f2b2e6e635a7a6643ca043a215084d51cc1e3bee01d8a61ac0855d7728af5668a2e79b2a020b13a8bfe63b1047e6bc92958a14dd37a7c2c0c7870f65d4f98bfa71d7062c876f130e3eed53ee82e0f5ee7e80b29694d993043404893919634a4", 0xa1}, {&(0x7f0000001780)="91e39f169ad93898f9afb1d06fb646cf9d4d2c4d7935372ef2c07d24eae2c3d7faa8358b082f12446ebf58139596a361b8922ccefe0d660956f95f2b677cbde6808365015231ad4e8b3f89bd7d", 0x4d}, {&(0x7f0000001800)="564ef5358daa3feb11ed01e19adcb45c920179c4e051939b6f6dc512834bd566321649c93dab72703d55904b4a1e1a539d9e5abecb61814c8ad3719a1d78bef9f0e5c6506504b7d6ea6a6f268a0795c39b1b60edccf9d45951e8e6ca0e781845cb651f6b921ae2d790d75bc3a7e8707206e9260e1c5131b5a8ef8e44bf38a5c4f1fe90f469a20948f7facf090cae45d481c5345baaa82d4ec3626f46a7e4310ecedf0cd43cc951d9eed4daeaef0813722180f18f", 0xb4}, {&(0x7f00000018c0)="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", 0xfa}, {&(0x7f00000019c0)="1807cd8bfb3e58b006b0ebd2523f0b533b9762d1e67484b2b8156b3be58a118da6325a7f9397e258831abc6498dffaba0682bc4729a14066d4e0e68f4c895d88955ef9cccdb22985a7d30134788c4519651060ba61f45f0fc1d750378a4e1d20a1c7f8f24e808b9276cb28e1dee9bb3e394126", 0x73}], 0x6, &(0x7f0000001b40)=[@rthdrdstopts={{0x88, 0x29, 0x37, {0x2f, 0xe, [], [@pad1, @generic={0x0, 0x6b, "73c6b95acf7de77eff72ea802351694ee82c52fc88ed3234fd59097241298891b70b06d8f40e206898c808b38ef4c82742bb8343ff2895032eb8702c832184ef6ade0e56309b856c6c0dd59d557355348d1cc8bcf3cd998acaa324a3ef81d14b3a6b3de756b97c3f7e11d0"}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x80000000}}, @rthdr_2292={{0x88, 0x29, 0x39, {0x6, 0xe, 0x2, 0x8, 0x0, [@mcast2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, [], 0x1, 0x0}, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @empty, @local]}}}, @rthdr={{0x98, 0x29, 0x39, {0x3c, 0x10, 0x2, 0xce, 0x0, [@loopback, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast1, @ipv4={[], [], @multicast2}, @loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback]}}}, @dstopts={{0x1050, 0x29, 0x37, {0x33, 0x206, [], [@hao={0xc9, 0x10, @remote}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @mcast2}, @generic={0x7, 0x1000, "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"}, @enc_lim={0x4, 0x1, 0x20}, @pad1]}}}, @pktinfo={{0x24, 0x29, 0x32, {@loopback, r2}}}], 0x1238}}, {{&(0x7f0000002d80)={0xa, 0x4e24, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}, 0x1c, &(0x7f0000002f40)=[{&(0x7f0000002dc0)="f91fae00081019974a6f8b243d98bf965b4be8af3c36340c226240b5d88854594b4a4c17b1f4981db86f481867a905d18351afc0397b4d21945aac669fb793103de3268e245d05a23b3b3461262359bfe5ad6dd3581d9c24dfbe9eb0b96ccd6bb1f08716ff75f53aad665a2a7694f686fc9a5e5307cdbfb10b53a7d32f62c3302123d2b25b3cbe92005df8d808aa8c111927afd1b0d49caa96b8deb441308981b182923c1ff98bd8b3", 0xa9}, {&(0x7f0000002e80)="3925f17aee242862fc070f6f8e87867ddbeb15c188d16d2de36e560c02fcc3931c72fc462412706f0c1272210276ca75ddf1426ed48dd679d41c38b388dae3fb0298b8995e51b233e8b2e16776ecddc31d5fdc8d183abc609ae42a78d41ca1443e6d22d238a43b0af00d423d49e7992d3428f768c48bf461d7d09bcfdc7d800f8b452e2bda6a9710f2b1ad5e187269d2b14993f6d585a20fc051455b313fb87b800ccc72ac622f6a9fbe77796bb51d97ff", 0xb1}], 0x2, &(0x7f0000002f80)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x200}}, @tclass={{0x14, 0x29, 0x43, 0x3}}, @flowinfo={{0x14, 0x29, 0xb, 0x1f}}, @dstopts={{0x70, 0x29, 0x37, {0x3c, 0xa, [], [@padn={0x1, 0x2, [0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x8}, @pad1, @calipso={0x7, 0x18, {0x0, 0x4, 0x4, 0x401, [0x7fffffff, 0x7]}}, @enc_lim={0x4, 0x1, 0xde}, @ra={0x5, 0x2, 0x7fff}, @calipso={0x7, 0x18, {0x2, 0x4, 0x0, 0x3f, [0x7fff, 0x81]}}, @ra={0x5, 0x2, 0x8}, @jumbo={0xc2, 0x4, 0x9}, @ra={0x5, 0x2, 0x200}]}}}], 0xb8}}, {{0x0, 0x0, &(0x7f00000033c0)=[{&(0x7f0000003040)="7164e0f21e0991e06a7b3ab67edde9dfb470fc178a9629ab76f8f13b71bcaba8c2a0fbdb3aa82f088bb775c8995026ffe6fb8135a77f04596f25b2bff6f31c04ae8904c9bab8fc115e2d38dc9826c27b41cf0c4a881be2c213b1c22cf87e4b8f623d600ca93c819238b7db550cb23a", 0x6f}, {&(0x7f00000030c0)="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", 0xfd}, {&(0x7f00000031c0)="7149be8aa3f87f167af9b5e84052476d5d0da58538", 0x15}, {&(0x7f0000003200)="6fa2db7eedee6acd665246bef69eaa82240e82272762c74e9b20475062adae6f2c462b959bfa329e4d35c264c5cc9ab0ed23d312e479e59e1ba258e8667c17b672af8c80d77977ebde96b0eb583d", 0x4e}, {&(0x7f0000003280)="6adf5897609740833eb664344321018a01f58e88772ec88702d4306e2bf0df1c0bdf5fc1f45169f81aa9a14583b8a780c0861c2f0f5eba1d8daf03c31b5c2fef9c2ed0951bf72e5941d302f0c05e0d", 0x4f}, {&(0x7f0000003900)="38819cb9a0924f3af96b5cd606efc93d9464a9a3467ae680c8bef5da29f4c8e2877846b0f5875b68f61e2e9c2d4069420361aba5f711171b6d0d457ac2de22f3b7ba4907052ed378916c44638d321f81715adb49dbf1acf1ee932faff4de1349dbe8264ec8a2058daadea7f7280d6596f7839b776f96200b42d054cce25ebd3445a36832d499233b2912765f719c24c57624fd3892abf771", 0x98}], 0x6}}, {{&(0x7f0000003440)={0xa, 0x4e22, 0xffffffff, @mcast2, 0xfffff619}, 0x1c, &(0x7f0000003500)=[{&(0x7f0000003480)="06ad41345d8680297e95f19be1b638d187952360dce6f17015568eb470d93d6a8857b446626a9bf983bfbd00346f9b25f479437ae72735265331ec8356ac916c81d1d2d3c60767253dcf9b20d71faf", 0x4f}], 0x1, &(0x7f0000003540)=[@rthdrdstopts={{0x90, 0x29, 0x37, {0x62, 0xe, [], [@jumbo={0xc2, 0x4, 0xfffffffc}, @enc_lim={0x4, 0x1, 0x5}, @ra, @jumbo={0xc2, 0x4, 0x2}, @hao={0xc9, 0x10, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x35}}}, @calipso={0x7, 0x48, {0x1, 0x10, 0x80, 0x1, [0x5, 0xc8b, 0x1, 0x58, 0x8, 0x5, 0x401, 0x8000]}}, @pad1]}}}, @hopopts_2292={{0x1d0, 0x29, 0x36, {0x3a, 0x36, [], [@padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @calipso={0x7, 0x50, {0x2, 0x12, 0xf8, 0x9, [0x5, 0xff1, 0x10001, 0x5, 0xbd55, 0x7, 0x0, 0x4776, 0x3ff]}}, @enc_lim={0x4, 0x1, 0x6}, @jumbo={0xc2, 0x4, 0x800}, @padn={0x1, 0x2, [0x0, 0x0]}, @calipso={0x7, 0x48, {0x0, 0x10, 0x1, 0xffff, [0x6, 0x7, 0x0, 0x5, 0x400, 0x2, 0x1, 0x7]}}, @jumbo={0xc2, 0x4, 0x9}, @generic={0x0, 0xfe, "2231e7c0bd9e67dba316d5131e7f40e5f645319082976ab4e8f0b38355c08008c006f4d2a2ca1569721b7077cd3d722dfa8a78554fb4dc1e6af025fa0f1aa5ccbaa53bca3be2e427261d5bdac18ff3b37ed9d6feabee0cbb23045b39544445e335d6f527e663af6e4033559db400884d35ac28193aa23aae01d2953c23484f611b1a3a43b87cde91cb879cdf5b2abc1a5c92ebe45212e4b2af4f2e91504ef73ca02cb8d330b869e00556cd581544eb6bf311b896ca3cae2ea4daf4afda4120e06e7bb4f6cf53a71fcd5b38ade89a723a22169f4e4bb91331d95a3d279caa94b52fb1e887ab09491bd8f917df982dd7676b2d5b4acc7274febc92381ec59d"}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0xfffffc00}}], 0x278}}], 0x5, 0x4000000) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r3, 0x4b30, &(0x7f0000000100)=""/103) 13:26:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r3, 0x4b33, &(0x7f0000000100)=""/103) 13:26:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) getcwd(&(0x7f0000000040)=""/22, 0x16) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@ipv4_newaddr={0x30, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0xa0}, [@IFA_LOCAL={0x8, 0x2, @multicast2}, @IFA_BROADCAST={0x8, 0x4, @broadcast}, @IFA_FLAGS={0x8, 0x8, 0x400}]}, 0x30}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x4a}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r7, @ANYBLOB="0000400000000002280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@ipv4_newaddr={0x30, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0xa0, 0x0, r7}, [@IFA_LOCAL={0x8, 0x2, @multicast2}, @IFA_BROADCAST={0x8, 0x4, @broadcast}, @IFA_FLAGS={0x8, 0x8, 0x400}]}, 0x30}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000004c0)={'batadv_slave_0\x00', r7}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000640)={'veth1_to_bond\x00', 0x0}) sendmsg$NL80211_CMD_GET_INTERFACE(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)={0x4c, 0x0, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x8, 0x1}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x65, 0xffffffffffffffff}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r8}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r9}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000004}, 0x20004045) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000)='NLBL_CIPSOv4\x00') 13:26:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r3, 0x4b33, &(0x7f0000000100)=""/103) 13:26:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b33, &(0x7f0000000100)=""/103) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x101000, 0x0) [ 1462.065587] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 13:26:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r3, 0x4b33, &(0x7f0000000100)=""/103) [ 1462.143699] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 13:26:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x9, 0x11, 0x14, "d50797f9a6fb38ef80d4f63a974ffa9a77ecf0ca7ce840f7a8b7cbebe7ddaf3517bb0f57397a513f6fcbcc979fef9e24f91e9585c012586e14bf0130b149ba19", "7401ba675921bc3d376ea399d3ef3816ff2c9404f533af71df587fb6b4da4cd8063986cfb185d4142084b6255beadf0e620f1cd1d8aed2842f6a0d17a03faa1d", "e2334fae692bf93a8fe7da3e48bb4b18a1eb9187c6a7b01cf3f7437b2d1b0f42", [0x101, 0xc2f]}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet6_tcp_int(r1, 0x6, 0x6, &(0x7f0000000180)=0xdc7e, 0x4) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) 13:26:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000000)={0x8f, ""/143}) 13:26:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3a) r2 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) getpeername$llc(r2, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = socket$inet6(0xa, 0x3, 0x3a) r5 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000940)=@mangle={'mangle\x00', 0x1f, 0x6, 0x6d0, 0x118, 0x2a0, 0x390, 0x118, 0x390, 0x600, 0x600, 0x600, 0x600, 0x600, 0x6, &(0x7f0000000180), {[{{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [0xffffffff, 0x0, 0xffffff00, 0xff], [0x0, 0xff000000, 0xff, 0xffffff00], 'team_slave_1\x00', 'veth0_to_team\x00', {0xff}, {0xff}, 0xda}, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private0, @ipv4=@private=0xa010100, 0x12, 0x3a, 0xa835}}}, {{@uncond, 0x0, 0x160, 0x188, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x16, 0x2, 0x3f, 0x81, 0x8, @private1={0xfc, 0x1, [], 0x1}, @loopback, @loopback, [0xffffff00, 0xffffff00, 0xff, 0xffffff00], [0xff, 0x0, 0xffffffff, 0xffffffff], [0xff000000, 0x0, 0xff], 0x800, 0x2800}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x3}}]}, @HL={0x28, 'HL\x00', 0x0, {0x3, 0x5}}}, {{@ipv6={@loopback, @private0, [0xff000000, 0xffffffff, 0xffffffff, 0xffffff00], [0xffffffff, 0xff, 0xff000000, 0xffffffff], '\x00', 'syzkaller1\x00', {}, {0xff}, 0x1d, 0x1, 0x2, 0xe}, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @ipv4=@multicast2, 0x2d, 0x2a, 0x9}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x1}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@local, @ipv6=@local, 0x1c, 0x2e, 0xb6}}}, {{@ipv6={@private1={0xfc, 0x1, [], 0x1}, @dev={0xfe, 0x80, [], 0x37}, [0xffffff00, 0xffffff00, 0xffffff00, 0xffffffff], [0xffffffff, 0xff, 0xffffff00, 0xff000000], 'macvlan0\x00', 'macvtap0\x00', {0xff}, {0x7f}, 0x88, 0x7, 0x2, 0x20}, 0x0, 0x118, 0x158, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}, {0x9, 0x1df2be394b767638, 0x1, [0x2, 0x4, 0x1, 0x0, 0x7, 0x4, 0x6, 0x6f4, 0x3, 0x1, 0x4, 0x0, 0x253, 0x8001, 0x0, 0x5], 0x6}}, @common=@icmp6={{0x28, 'icmp6\x00'}, {0x15, "c4e9", 0x1}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x2, 0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x730) creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000080)) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) dup2(r0, r3) r6 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$GIO_SCRNMAP(r6, 0x4b33, &(0x7f0000000100)=""/103) r7 = socket$inet6(0xa, 0x3, 0x3a) r8 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r7, r8, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r7, 0x6, 0x21, &(0x7f00000000c0)="21995b3cd590c648dcf19ab764f5dcf1", 0x10) 13:26:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x3a6) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) 13:26:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) [ 1462.354485] x_tables: duplicate underflow at hook 1 13:26:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) ioctl$DRM_IOCTL_MODE_SETGAMMA(r1, 0xc02064a5, &(0x7f00000000c0)={0x2eda, 0x1, &(0x7f0000000000)=[0x8], &(0x7f0000000040)=[0x0, 0x646, 0x7], &(0x7f0000000080)=[0x1ff]}) 13:26:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 1462.429673] x_tables: duplicate underflow at hook 1 13:26:14 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x100) accept$netrom(r0, &(0x7f0000000040)={{0x3, @null}, [@rose, @rose, @rose, @remote, @bcast, @default, @default, @rose]}, &(0x7f00000000c0)=0x48) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r3, 0x4b33, &(0x7f0000000100)=""/103) 13:26:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) dup2(r0, r1) 13:26:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f0000000180)={"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"}) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r3, 0x4b30, &(0x7f0000000100)=""/103) 13:26:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b33, &(0x7f0000000100)=""/103) 13:26:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, 0xffffffffffffffff) 13:26:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r1, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000000)=0xb5, 0x4) r2 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r3, 0x0) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r5 = socket(0xa, 0x1, 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r5, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB="200000ede3000000840000000200"/28, @ANYRES32=r7], 0x20}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r4, 0x84, 0x5, &(0x7f0000000080)={r7, @in6={{0xa, 0x4e23, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x100}}}, 0x84) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000040)={r7, 0xffffffff}, &(0x7f0000000080)=0x8) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r8, 0x4b30, &(0x7f0000000100)=""/103) 13:26:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r3, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r3, 0x110, 0x2, &(0x7f0000000000)='],\x00', 0x3) bind$isdn(r1, &(0x7f0000000040)={0x22, 0x80, 0xd5, 0x1f, 0x2}, 0x6) 13:26:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, 0xffffffffffffffff) [ 1462.710342] audit: type=1800 audit(1593177974.345:116): pid=20553 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=15876 res=0 13:26:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) dup2(r0, r1) 13:26:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, 0xffffffffffffffff) 13:26:14 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000180)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x361840, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r4, 0x4b30, &(0x7f0000000100)=""/103) 13:26:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b33, &(0x7f0000000100)=""/103) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x101000, 0x0) 13:26:14 executing program 0: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) dup2(0xffffffffffffffff, r0) 13:26:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b33, &(0x7f0000000100)=""/103) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x101000, 0x0) 13:26:14 executing program 4: ioctl$FBIOPUTCMAP(0xffffffffffffffff, 0x4605, &(0x7f0000000180)={0x5, 0x9, &(0x7f0000000000)=[0x5, 0xb8d, 0x4c, 0x1, 0x5, 0xc8, 0x5, 0x451, 0x18c], &(0x7f0000000040)=[0x400, 0xbed], &(0x7f0000000080)=[0x7fff], &(0x7f00000000c0)=[0x9, 0x4, 0x0, 0x4]}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x144, 0x10, 0x713, 0x0, 0x0, {{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@empty, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @offload={0xc}]}, 0x144}}, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_open_dev$vim2m(&(0x7f00000001c0)='/dev/video#\x00', 0xffffffffffffffff, 0x2) ioctl$GIO_SCRNMAP(r3, 0x4b30, &(0x7f0000000100)=""/103) 13:26:14 executing program 0: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) dup2(0xffffffffffffffff, r0) 13:26:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b33, &(0x7f0000000100)=""/103) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x101000, 0x0) 13:26:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) ioctl$SIOCPNENABLEPIPE(0xffffffffffffffff, 0x89ed, 0x0) fchmod(0xffffffffffffffff, 0x16c) open(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x71) r3 = socket$inet(0x2, 0x3, 0x80000000002) setsockopt$inet_int(r3, 0x0, 0x5, &(0x7f0000000080)=0x58, 0x4) setsockopt$inet_int(r1, 0x0, 0x3, 0x0, 0x4) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f00000000c0)=0x618, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400006) syz_open_dev$tty1(0xc, 0x4, 0x3) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r4, 0xc004500a, &(0x7f0000000040)) socket$inet6(0xa, 0x3, 0x3a) r5 = open(&(0x7f0000000240)='./file0/bus\x00', 0x401, 0x32) sendfile(0xffffffffffffffff, r5, 0x0, 0x0) creat(&(0x7f0000000100)='./file0/bus\x00', 0x0) 13:26:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc01064b5, &(0x7f0000000040)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, &(0x7f00000000c0)={r3, 0x8, 0x4, 0x40, 0x4, 0x7, 0xff, 0x40, 0x1800, 0xfffffff7, 0x101, 0xe41}) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, &(0x7f0000000080)={r3, 0x4, 0x2183f057, 0x5, 0xa550, 0x3ff, 0x2f60, 0x1, 0x5, 0xc1, 0x9, 0x8}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$GIO_SCRNMAP(r6, 0x4b31, &(0x7f0000000100)=""/103) getsockname$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c) 13:26:15 executing program 0: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) dup2(0xffffffffffffffff, r0) 13:26:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffffffffffffffff) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) 13:26:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b33, &(0x7f0000000100)=""/103) 13:26:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) 13:26:15 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$vsock_dgram(0x28, 0x2, 0x0) dup2(0xffffffffffffffff, r0) 13:26:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x2, 0x300) pipe(&(0x7f0000000280)={0xffffffffffffffff}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) ptrace$pokeuser(0x6, r4, 0x9246, 0x0) r5 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LIST(r3, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r5, 0x800, 0x70bd29, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x8800) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000000)=r4) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r6, 0x4b30, &(0x7f0000000100)=""/103) 13:26:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b31, &(0x7f0000000100)=""/103) r3 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r3, 0x0) ioctl$TCSETS2(r3, 0x402c542b, &(0x7f0000000000)={0x8, 0x8, 0x58e7, 0x1f, 0x20, "da52895bc3fcaae252db26d31486542a54cb90", 0x5, 0x401}) 13:26:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 13:26:15 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$vsock_dgram(0x28, 0x2, 0x0) dup2(0xffffffffffffffff, r0) 13:26:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm, @timestamp, @window={0x3, 0x2, 0xfffd}, @window={0x3, 0xfff, 0x3}, @timestamp, @sack_perm, @window={0x3, 0x6, 0x5}], 0x7) r2 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r3, 0x4b30, &(0x7f0000000100)=""/103) socket$inet6(0xa, 0x6, 0x3a) r4 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x3a) r6 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x0) r7 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r7, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r6, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000180), 0x4, r8, 0x1c, 0x0, @ib={0x1b, 0x7, 0x7, {"fbb98a6458d2b7c91e897c7b0d5a32c1"}, 0x1, 0x7, 0x66}}}, 0xa0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5) ioctl$FBIOPUT_CON2FBMAP(r4, 0x4610, &(0x7f0000000040)={0x11, 0x1}) ioctl$VIDIOC_ENUMSTD(r2, 0xc0485619, &(0x7f0000000080)={0x80000000, 0x50007, "b3224164fe6b43f049ed2924508d81806b4d6106a8802154", {0x9, 0xfffffff9}, 0x80000001}) 13:26:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0xffffffffffffe4fb, 0x60080) ioctl$UI_SET_PROPBIT(r3, 0x4004556e, 0x1f) ioctl$GIO_SCRNMAP(r2, 0x4b31, &(0x7f0000000100)=""/103) 13:26:15 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$vsock_dgram(0x28, 0x2, 0x0) dup2(0xffffffffffffffff, r0) 13:26:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) 13:26:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) r3 = dup2(r0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6(0xa, 0x3, 0x3a) r5 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x0) getsockopt$inet6_int(r5, 0x29, 0x24, &(0x7f0000000000), &(0x7f0000000040)=0x4) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r6, 0x4b30, &(0x7f0000000100)=""/103) 13:26:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) dup2(r0, 0xffffffffffffffff) 13:26:15 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000000), 0x4) 13:26:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x1000, 0x40000) ioctl$GIO_SCRNMAP(r2, 0x4b31, &(0x7f0000000100)=""/103) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x7) 13:26:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r2, 0x40206417, &(0x7f0000000040)={0x6b, 0x10000, 0x4, 0x9, 0x8}) sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x24, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x200}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r4, 0x4b31, &(0x7f0000000100)=""/103) 13:26:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) 13:26:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) dup2(r0, 0xffffffffffffffff) 13:26:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) pipe(&(0x7f0000000280)={0xffffffffffffffff}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) ptrace$pokeuser(0x6, r4, 0x9246, 0x0) tkill(r4, 0x7) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r5 = socket$inet6(0xa, 0x3, 0x3a) r6 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x0) ioctl$KDFONTOP_COPY(r6, 0x4b72, &(0x7f0000000000)={0x3, 0x0, 0xc, 0x11, 0x1f4, &(0x7f00000002c0)}) r7 = socket$inet6(0xa, 0x3, 0x3a) r8 = open(&(0x7f0000000240)='./file0/bus\x00', 0x40, 0x8a) sendfile(r7, r8, 0x0, 0x0) getsockopt$inet6_buf(r7, 0x29, 0x2b, &(0x7f0000000040)=""/62, &(0x7f0000000180)=0x3e) r9 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r9, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r9, 0x40042409, 0x1) 13:26:15 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000000), 0x4) 13:26:15 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000000), 0x4) 13:26:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) dup2(r0, 0xffffffffffffffff) 13:26:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid', 0x3d, r5}}]}) newfstatat(0xffffffffffffff9c, &(0x7f0000000740)='./file0/bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX=r5, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC=r6, @ANYBLOB]) ioctl$GIO_SCRNMAP(r3, 0x4b31, &(0x7f0000000000)=""/120) r7 = socket$inet6(0xa, 0x3, 0x3a) r8 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r7, r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14, 0x67, 0x2, {0x2, 0x3, 0x6}}, 0x14) 13:26:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet6(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x0) ioctl$VT_DISALLOCATE(r3, 0x5608) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) 13:26:15 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) 13:26:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) fcntl$setflags(r3, 0x2, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r4, 0x5606, 0x3) 13:26:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = socket(0x1f, 0x3, 0x1) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x4a}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r6, @ANYBLOB="0000400000000002280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@ipv4_newaddr={0x30, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0xa0, 0x0, r6}, [@IFA_LOCAL={0x8, 0x2, @multicast2}, @IFA_BROADCAST={0x8, 0x4, @broadcast}, @IFA_FLAGS={0x8, 0x8, 0x400}]}, 0x30}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@newqdisc={0x60, 0x24, 0x2, 0x70bd26, 0x25dfdbfd, {0x0, 0x0, 0x0, r6, {0x3, 0x3}, {0x3, 0x4}, {0x7, 0xf}}, [@TCA_RATE={0x6, 0x5, {0x3, 0x1}}, @TCA_RATE={0x6, 0x5, {0x1, 0x2}}, @qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x1c, 0x2, [@TCA_HHF_BACKLOG_LIMIT={0x8, 0x1, 0x5}, @TCA_HHF_QUANTUM={0x8, 0x2, 0xfffffffc}, @TCA_HHF_NON_HH_WEIGHT={0x8, 0x7, 0x1}]}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x5}]}, 0x60}, 0x1, 0x0, 0x0, 0x8004800}, 0x4000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r7, 0x4b30, &(0x7f0000000100)=""/103) 13:26:16 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) 13:26:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) fcntl$setflags(r3, 0x2, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r4, 0x5606, 0x3) 13:26:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x3a) r5 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') r8 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r8, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r6, &(0x7f0000000580)={0x0, 0x14, &(0x7f0000000540)={&(0x7f00000002c0)={0x1c, r7, 0x301, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r9}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r5, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, r7, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @dev={[], 0x35}}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x4}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x44}, 0x10) r10 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r10, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) getsockopt$SO_TIMESTAMP(r5, 0x1, 0x1d, &(0x7f0000000280), &(0x7f00000000c0)=0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r1, 0x4b30, &(0x7f0000000000)=""/103) [ 1464.457549] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1464.460197] hfs: gid requires an argument [ 1464.490519] hfs: unable to parse mount options 13:26:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) fcntl$setflags(r3, 0x2, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r4, 0x5606, 0x3) 13:26:16 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) [ 1464.561013] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 13:26:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid', 0x3d, r5}}]}) newfstatat(0xffffffffffffff9c, &(0x7f0000000740)='./file0/bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX=r5, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC=r6, @ANYBLOB]) ioctl$GIO_SCRNMAP(r3, 0x4b31, &(0x7f0000000000)=""/120) r7 = socket$inet6(0xa, 0x3, 0x3a) r8 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r7, r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14, 0x67, 0x2, {0x2, 0x3, 0x6}}, 0x14) 13:26:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) fdatasync(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) 13:26:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) 13:26:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) fcntl$setflags(r3, 0x2, 0x0) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x3) 13:26:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x80000, 0x136) r2 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) r3 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0xb4f) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r4, 0x4b30, &(0x7f0000000100)=""/103) 13:26:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) 13:26:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'mangle\x00', 0x46, "48ed0fc7be1467c0ea39640741cdc5250e603e2b57f0558f570bf4d97723eda49f7907c4ee60ed5fea9dfcf740ac023a7dac653b3b091ff80d98c555d05507f34e44347f3edd"}, &(0x7f0000000080)=0x6a) [ 1464.829696] hfs: gid requires an argument [ 1464.833884] hfs: unable to parse mount options 13:26:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) fcntl$setflags(r3, 0x2, 0x0) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x3) 13:26:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) 13:26:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x0, 0x410000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r3 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0xd9e, 0x20040) r4 = dup2(r3, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r5, 0x4b30, &(0x7f0000000100)=""/103) 13:26:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) ioctl$SNDCTL_DSP_GETODELAY(r3, 0x80045017, &(0x7f0000000000)) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r4, 0x4b30, &(0x7f0000000100)=""/103) 13:26:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) 13:26:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid', 0x3d, r5}}]}) newfstatat(0xffffffffffffff9c, &(0x7f0000000740)='./file0/bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX=r5, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC=r6, @ANYBLOB]) ioctl$GIO_SCRNMAP(r3, 0x4b31, &(0x7f0000000000)=""/120) r7 = socket$inet6(0xa, 0x3, 0x3a) r8 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r7, r8, 0x0, 0x0) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14, 0x67, 0x2, {0x2, 0x3, 0x6}}, 0x14) 13:26:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) fcntl$setflags(r3, 0x2, 0x0) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x3) 13:26:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) 13:26:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400201) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) r3 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x7d3, 0xccf83) ioctl$GIO_SCRNMAP(r3, 0x4b30, &(0x7f0000000080)=""/74) 13:26:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) 13:26:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r4, 0x5606, 0x3) [ 1465.213058] hfs: gid requires an argument [ 1465.218355] hfs: unable to parse mount options 13:26:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000000), 0x4) 13:26:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r4, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000000)={'xfrm0\x00', 0x6}) 13:26:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid', 0x3d, r5}}]}) newfstatat(0xffffffffffffff9c, &(0x7f0000000740)='./file0/bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX=r5, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC=r6, @ANYBLOB]) ioctl$GIO_SCRNMAP(r3, 0x4b31, &(0x7f0000000000)=""/120) r7 = socket$inet6(0xa, 0x3, 0x3a) r8 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r7, r8, 0x0, 0x0) 13:26:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) socket$inet_tcp(0x2, 0x1, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r3, 0x5606, 0x3) 13:26:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000000), 0x4) 13:26:17 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r2 = socket(0xa, 0x1, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB="200000ede30000006f400200090000000000009f7b87ab0100000000", @ANYRES32=r4], 0x20}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000080)={r4, @in6={{0xa, 0x4e23, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x100}}}, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000100)={r4, @in={{0x2, 0x4e23, @rand_addr=0x64010100}}, [0x37e6, 0x7fffffff, 0x6000, 0x8001, 0x2, 0x3, 0x7e, 0x7fffffff, 0x9, 0x1000, 0x200, 0x5, 0x80000001, 0x401, 0x5]}, &(0x7f0000000000)=0x100) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r5, 0x4b30, &(0x7f0000000080)=""/107) 13:26:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000000), 0x4) [ 1465.492587] hfs: gid requires an argument [ 1465.503029] hfs: unable to parse mount options 13:26:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r3, 0x5606, 0x3) 13:26:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0xb0d302, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r3, 0xc0106418, &(0x7f0000000040)={0xfff, 0x8, 0x3, 0x1000, 0x9, 0x3}) [ 1465.541170] audit: type=1800 audit(1593177977.175:117): pid=20803 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16275 res=0 13:26:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid', 0x3d, r5}}]}) newfstatat(0xffffffffffffff9c, &(0x7f0000000740)='./file0/bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX=r5, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC=r6, @ANYBLOB]) ioctl$GIO_SCRNMAP(r3, 0x4b31, &(0x7f0000000000)=""/120) socket$inet6(0xa, 0x3, 0x3a) open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) 13:26:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, 0x0, 0x0) 13:26:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3) 13:26:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r1, 0x0) r2 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x45) fchmod(r2, 0x0) r3 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r3, 0x0) r4 = socket$inet6(0xa, 0x3, 0x3a) r5 = open(&(0x7f0000000080)='./file0/bus\x00', 0x480e00, 0x0) sendfile(r4, r5, 0x0, 0x0) r6 = socket$inet6(0xa, 0x3, 0x3a) r7 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x7) r8 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r8, 0x0, 0x0) accept$unix(r8, 0x0, &(0x7f0000000040)) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b30, &(0x7f0000000100)=""/103) 13:26:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, 0x0, 0x0) 13:26:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3) [ 1465.795360] hfs: gid requires an argument [ 1465.802238] hfs: unable to parse mount options 13:26:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, 0x0, 0x0) 13:26:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid', 0x3d, r5}}]}) newfstatat(0xffffffffffffff9c, &(0x7f0000000740)='./file0/bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX=r5, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC=r6, @ANYBLOB]) ioctl$GIO_SCRNMAP(r3, 0x4b31, &(0x7f0000000000)=""/120) socket$inet6(0xa, 0x3, 0x3a) [ 1466.046357] hfs: gid requires an argument [ 1466.051368] hfs: unable to parse mount options 13:26:18 executing program 4: getrandom(&(0x7f0000000000)=""/25, 0x19, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) 13:26:18 executing program 5: r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r0, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x70, 0x3, 0x6, 0x401, 0x0, 0x0, {0xc, 0x0, 0x8001}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x70}}, 0x240408c0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r3, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000280)={0x0, 0x1, 0xfffffffffffffff9, &(0x7f0000000200)=0x3}) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r4, 0x4b30, &(0x7f0000000100)=""/103) r5 = socket$inet6(0xa, 0x3, 0x3a) r6 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r6, 0x80045400, &(0x7f00000001c0)) 13:26:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r1, 0x5606, 0x3) 13:26:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r4, 0x5606, 0x3) 13:26:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid', 0x3d, r5}}]}) newfstatat(0xffffffffffffff9c, &(0x7f0000000740)='./file0/bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX=r5, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC=r6, @ANYBLOB]) ioctl$GIO_SCRNMAP(r3, 0x4b31, &(0x7f0000000000)=""/120) 13:26:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = accept4(r1, &(0x7f0000000000)=@generic, &(0x7f0000000080)=0x80, 0x80000) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f0000000240)={0x0, 0xf, &(0x7f0000000300)={&(0x7f0000000100)={0x28, r4, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x4}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}]}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(r3, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000400)={&(0x7f0000000180)={0x25c, r4, 0x400, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x69a}]}, @TIPC_NLA_MON={0x4c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x400}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7b600000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_MEDIA={0x14, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MEDIA={0x100, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9e8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffff8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NODE={0x90, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x48, 0x4, {'gcm(aes)\x00', 0x20, "94e5d33a7970404ee930f6131158c69370476b66054cf860a86721ed38248770"}}, @TIPC_NLA_NODE_KEY={0x41, 0x4, {'gcm(aes)\x00', 0x19, "33de361863b008d362fc41d9793c4ddeeb4ba9fafb9bcb9f06"}}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xffffff2a}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xd6e}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xffff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xc251}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x100}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x80000000}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x1}, 0x50) 13:26:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r1, 0x5606, 0x3) 13:26:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x40806685, &(0x7f00000003c0)={0x1, 0x1, 0x1000, 0x5d, &(0x7f0000000300)="77c219539a02532b061c6b03b98355fefe34c6952fa582a345f16ba7112dc06e32326aed7469ade199881de939fb43401c01819d2afb4f8b01c53f78a866ba2a1f9cdcc50b6b8cab94ad48d5c40d54edbe10a550b928b572892a07fad8", 0x8, 0x0, &(0x7f0000000380)="a2271f57005a5d08"}) r3 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r4, 0x4b30, &(0x7f0000000100)=""/103) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000240)={0x8}, 0x4) clock_gettime(0x2, &(0x7f0000000280)) r5 = creat(&(0x7f0000000500)='./file0/bus\x00', 0x182) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x3}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f00000004c0)={0x100, r6}) fchmod(r5, 0x0) ioctl$KDSETKEYCODE(r5, 0x4b4d, &(0x7f0000000440)={0x2, 0x4}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101480, 0x0) socketpair(0x1d, 0x6, 0xfff, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$IMSETDEVNAME(r7, 0x80184947, &(0x7f00000001c0)={0x7fffffed, 'syz1\x00'}) sendmsg$nl_netfilter(r8, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0xf, 0x1, 0x201, 0x70bd28, 0x25dfdbfc, {0x7, 0x0, 0xa}, [@typed={0xc, 0x63, 0x0, 0x0, @u64=0x7fffffff}]}, 0x20}}, 0x4000000) 13:26:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000000)={0x0, {}, 0x0, {}, 0x9, 0x1, 0x10, 0x9, "45633857a08a55fd3e0f5cc8ee82d8ce63e6dd0451ef19af365013873baae0031723b43f1c59dea3fd6b30492d9887f2e417b8e1c32e179bc18876ff20373745", "2b3d1f46147a5f1d0e05f3b0156baf63c93acae2118c5d0296e55342ec0b2b60", [0xfffffffffffff2d8, 0x5]}) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) 13:26:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r4, 0x5606, 0x3) 13:26:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) [ 1466.636347] hfs: gid requires an argument [ 1466.650076] hfs: unable to parse mount options 13:26:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r1, 0x5606, 0x3) 13:26:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r4, 0x5606, 0x3) 13:26:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200, 0x0) setsockopt$inet_udp_int(r1, 0x11, 0x65, &(0x7f0000000040)=0x10001, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r3 = dup2(r0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r4, 0x4b30, &(0x7f0000000100)=""/103) 13:26:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid', 0x3d, r5}}]}) newfstatat(0xffffffffffffff9c, &(0x7f0000000740)='./file0/bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX=r5, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC=r6, @ANYBLOB]) 13:26:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8001, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f00000000c0)={0x13a0000, 0x5, 0x2, r4, 0x0, &(0x7f0000000080)={0x9b090c, 0x4078, [], @string=&(0x7f0000000040)=0xf9}}) ioctl$SOUND_MIXER_READ_VOLUME(r5, 0x80044d13, &(0x7f0000000180)) ioctl$GIO_SCRNMAP(r3, 0x4b30, &(0x7f0000000100)=""/103) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="200000ede300000084000000021d000000000000000000fc3f000000bd1a134f85d2ba6ea1f85ef7a3e92c0ac01404477ab3653e641cb104a800584dac0af626140cb1356eb92f328a064a1eee382975409647ecd71777ff460ff8d2bcc0c130c63b325ccb23607f40f4179ba412", @ANYRES32=r6], 0x20}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000080)={r6, @in6={{0xa, 0x4e23, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x100}}}, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000002c0)={r6, 0x74, &(0x7f0000000200)=[@in6={0xa, 0x4e23, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x6}, @in6={0xa, 0x4e24, 0xcd71, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast2}, @in6={0xa, 0x4e21, 0x1, @remote, 0x200}, @in={0x2, 0x4e21, @broadcast}]}, &(0x7f0000000300)=0x10) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) pipe(&(0x7f0000000280)={0xffffffffffffffff}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r8, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) ptrace$pokeuser(0x6, r9, 0x9246, 0x0) fcntl$setownex(r7, 0xf, &(0x7f00000001c0)={0x1, r9}) 13:26:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x3) 13:26:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x100) fchmod(r2, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f0000000000)=0xff) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r3, 0x4b30, &(0x7f0000000100)=""/103) socket$packet(0x11, 0x2, 0x300) 13:26:18 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r0, 0x5606, 0x3) 13:26:18 executing program 2: ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x2, 'ip_vti0\x00', {0xfffffffc}, 0x2be}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000480)={{}, [@remote, @bcast, @rose, @remote, @null, @bcast, @rose, @null]}, &(0x7f0000000580)=0x48) ioctl$SIOCAX25CTLCON(r0, 0x89e8, &(0x7f0000000500)={@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, 0xc, 0x20, 0x8, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @bcast, @bcast]}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = socket$inet6(0xa, 0x3, 0x3a) r5 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r6 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, r5) r7 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r6) r8 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r7) request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, r8) r9 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f0000000380)="e3683864bf173a033b9f834be1b262ab64a2f395521719e5d5a4fb9f2dd4a636f2aa00e3956ce2565edf0d6034408741cc9aa85fb897d56a08aa3d062f38a30f6229bbfbb0813920f01ad1d88abaad2a0cb679fc6f09660baa0993aaddf4f310925c1a86d0bbbd6c944a3879b83a36a692b1ef04b0de41caf00bf896581737cc94682f9d1c37b2c87c86832f9af10e902ee83a190e0c35219fc38839222f31c74400c6cba51413b3a7c1141d4c0027ed47ef40a7caef59405ed079322bbb37fe292d3c3e80dad1a19c144b73b4b64f29e3a539f593799ee841b4dbf248744447baea05a6078e4d961f132844c65ab1c5c966d0279add3adab1", 0xf9, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, r8, &(0x7f0000000080)=[{&(0x7f0000000280)="c721d3ab91e25456d54fbdb49ea975470b472fea5215cac5cfbb7bb2ac764f6ba7d5c8ee279d10670ba135b64c2a64f7dcbb03813fe2fe6699ee6ee8fcf675214922200a843aef3ef02789c7e463b399005199a86913c0239ab392e73659c552c69a4102c96bdc24ae19faf306876f12d3bf03ccc6cedf51ae06048f6a9eba5778a6c5816bdcc96bde9c95cd010874fbc0d20f5509d3ff552c25fd82cd4addc4b6121e374aa0d7621770541f03cc2241228b19a69d5a0f0927f88f3282acf96c7bc5f4bf83b20849d0374954d2d6b9d02860baa35e68", 0xd6}], 0x1, r9) r10 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r4, r10, 0x0, 0x0) ioctl$VIDIOC_OVERLAY(r10, 0x4004560e, &(0x7f0000000040)=0x1000) ioctl$GIO_SCRNMAP(r3, 0x4b30, &(0x7f0000000100)=""/103) 13:26:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x3) 13:26:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) ioctl$KVM_GET_DEVICE_ATTR(r2, 0x4018aee2, &(0x7f0000000040)={0x0, 0x4, 0x9, &(0x7f0000000000)=0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r3, 0x4b30, &(0x7f0000000100)=""/103) r4 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, r4) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0x0) keyctl$update(0x2, r5, &(0x7f0000000180)="61991f466547d9ec0a8f2cc7e330e5095309e5bc42c8f3fc0999e847cbf544a2a37cbbc26bcbdc5c8369e84028020809f07a85c4882daae9abfcb57edff6304de82e277c86f4476129a878d6f458cbc37654485394ec357c5c08c005e2435000a7628344797245b8a1e66e36fb0f7dff97c58ac69c9cebedca4c4dede656ed7119da23f212a0bd52214a6158a3c0d7", 0x8f) r7 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r7, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_CAP_ACK(r8, 0x10e, 0xa, &(0x7f0000000000)=0x4c, 0x4) sendmsg$nl_xfrm(r8, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)=ANY=[@ANYBLOB="f8000000160037030000000000000000e00000020000000000000000000000007f00000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fc0200000000000000000000000000000000000000000000fc0000000000000000000000f300"/164], 0xf8}}, 0x0) getsockopt$rose(r7, 0x104, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 1466.947149] hfs: gid requires an argument [ 1466.959153] hfs: unable to parse mount options 13:26:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x3) 13:26:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid', 0x3d, r5}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX=r5, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x2000) openat$cgroup_procs(r2, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f0000000040)=@v2={0x2, @aes256, 0x10, [], "df0313ba866d7db995ed1bb0113b9e1c"}) write$UHID_CREATE2(r2, &(0x7f0000000180)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00', 0xef, 0x1, 0x5, 0xacb, 0x3ff, 0x9, "71454561557eb52a9da53a69e5e8f29971431a1039059627a3e858bd8f17f154c51fd2d8f358d7c7d8baae763592f315b0163b978635ec2168ed49ccf8a1d41aa12de96e8d356160d6b9939e893f8765f8e2279fada87917d5ba3e584c49a276b4e9a5d8a383f8bb41904120b90974c6513ef311ffcba087dab6482f947094d547e350f85a290bd3cee06ab38c6dbb550b654eeef5b093e920405030c4f7ab5598db38f486aa49003d28c4b97b59c655f0c96668f5c71004a17eb447322bb3588198d959f176e7091a3795a08707b34d8f93bb61bf0216008e09a573dd0fd8d0d48ad950562ca10b3070bf4d5d0269"}}, 0x207) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r3 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$GIO_SCRNMAP(r4, 0x4b30, &(0x7f0000000100)=""/103) 13:26:18 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r0, 0x5606, 0x3) 13:26:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = socket$inet6(0xa, 0x3, 0x3a) r4 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r4, 0x40405514, &(0x7f0000000000)={0x3, 0x1, 0xffff1fe4, 0x10000, '\x00', 0x4}) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) 13:26:18 executing program 4: r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) sendto$unix(r0, &(0x7f00000001c0)="17057e2a63af4ac40e0a4ec2c38b0511963be3c4a160bdd0f6602b5f0c0347a374a4232caf783d13287f448090537e1265083e8c4a0bfe4a31fcfb089b5728b60b5379118b0f363300925a388563b25e84d8ed0ef8220df06f0376c154b777a92b2af2585bbf937729d1e8f8c515ebef671d5caf1fd63e2117c020ad2e5e336f7878cf95f19bb5730d809273924c02aef26dc4260c95d73c068b7934dd564a83d6eeb2721ee1c74e16a02b75b1e83dc69b3ca02b", 0xb4, 0x804, &(0x7f0000000280)=@file={0x1, './file0/bus\x00'}, 0x6e) fchmod(r0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f0000000180)={&(0x7f0000000000), &(0x7f0000000040)=""/133, 0x85}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getegid() r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r3, 0x4b30, &(0x7f0000000100)=""/103) 13:26:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) socket$inet_tcp(0x2, 0x1, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r3, 0x5606, 0x3) 13:26:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x50201, 0x0) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 13:26:18 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r0, 0x5606, 0x3) 13:26:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r3, 0x5606, 0x3) 13:26:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x6, 0x40) r2 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'team_slave_0\x00', 0x602}) r3 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r4, 0x4b30, &(0x7f0000000100)=""/103) 13:26:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = msgget$private(0x0, 0x0) msgsnd(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x2000, 0x0) msgrcv(r2, &(0x7f0000000000)={0x0, ""/209}, 0xd9, 0x1, 0x3000) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r3, 0x4b30, &(0x7f0000000100)=""/103) [ 1467.279733] hfs: gid requires an argument [ 1467.283938] hfs: unable to parse mount options 13:26:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX=r5, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000000)=""/113) 13:26:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3) 13:26:19 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r1, 0x5606, 0x3) 13:26:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$SNDCTL_DSP_GETFMTS(r1, 0x8004500b, &(0x7f0000000000)=0x8000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) 13:26:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3) 13:26:19 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r1, 0x5606, 0x3) 13:26:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) 13:26:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX=r5, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r1, 0x5606, 0x3) 13:26:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = socket$inet6(0xa, 0x3, 0x3a) r4 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) ioctl$VIDIOC_S_FREQUENCY(r4, 0x402c5639, &(0x7f00000000c0)={0x2, 0x3, 0x7fff}) r5 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfe6, 0x200001) ioctl$TIOCGDEV(r5, 0x80045432, &(0x7f0000000040)) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r5, 0x800442d2, &(0x7f0000000080)={0x7, &(0x7f0000000180)=[{0x0, 0x0, 0x0, @multicast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}, {}, {0x0, 0x0, 0x0, @random}, {}, {}]}) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) 13:26:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'trusted.', '\x00'}, &(0x7f0000000080)=""/28, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) 13:26:19 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r1, 0x5606, 0x3) 13:26:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3a) r2 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) connect$nfc_llcp(r2, &(0x7f0000000000)={0x27, 0x1, 0x2, 0x3, 0x5, 0x3, "3feddee3293dcaa1d594d3ead6e2dc27dace1e50622012895e144e5570aa2f4ee06cc7d8087f23c6055228b1567a704df90fb9215b5224c2111c70fd7ed803", 0xd}, 0x60) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r4 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r5, 0x4b30, &(0x7f0000000100)=""/103) 13:26:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r1, 0x5606, 0x3) 13:26:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX=r5, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = msgget$private(0x0, 0x0) msgsnd(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x2000, 0x0) msgctl$MSG_INFO(r2, 0xc, &(0x7f0000000000)=""/99) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r3, 0x4b30, &(0x7f0000000100)=""/103) 13:26:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r1, 0x5606, 0x3) 13:26:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3) 13:26:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = msgget$private(0x0, 0x0) msgsnd(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x2000, 0x0) msgctl$MSG_INFO(r2, 0xc, &(0x7f0000000000)=""/99) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r3, 0x4b30, &(0x7f0000000100)=""/103) 13:26:19 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r0, 0x5606, 0x3) 13:26:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3a) r2 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000080)=0x1) r3 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = socket$inet6(0xa, 0x3, 0x3a) r5 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x0) ioctl$GIO_SCRNMAP(r3, 0x4b30, &(0x7f0000000000)=""/103) 13:26:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3) 13:26:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) socket(0x10, 0x2, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid', 0x3d, r4}}]}) r5 = socket$inet6(0xa, 0x3, 0x3a) r6 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x0) statx(r6, &(0x7f0000000380)='./file0/bus\x00', 0x4000, 0x40, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid', 0x3d, r9}}]}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000004c0)={{}, {0x1, 0x6}, [{0x2, 0x1}, {0x2, 0x84c6a04e6cf22fd3}, {0x2, 0x5}, {0x2, 0x7}], {}, [{0x8, 0x6}, {0x8, 0x7}, {0x8, 0x4, r4}, {0x8, 0x6, r7}, {0x8, 0x2, r9}], {0x10, 0x5}}, 0x6c, 0x2) ioctl$UI_END_FF_ERASE(r2, 0x400c55cb, &(0x7f0000000000)={0xc, 0xffffffff, 0x1f}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r10 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r10, 0x4b30, &(0x7f0000000100)=""/103) 13:26:20 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r0, 0x5606, 0x3) 13:26:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = msgget$private(0x0, 0x0) msgsnd(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x2000, 0x0) msgctl$MSG_INFO(r2, 0xc, &(0x7f0000000000)=""/99) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r3, 0x4b30, &(0x7f0000000100)=""/103) 13:26:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3) 13:26:20 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet6(0xa, 0x3, 0x3a) r2 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) r3 = socket$inet_smc(0x2b, 0x1, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) sendfile(r4, r3, 0x0, 0x80000000) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000040), 0x4) ioctl$GIO_SCRNMAP(r1, 0x4b30, &(0x7f0000000100)=""/103) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000000)=ANY=[@ANYBLOB="040000000201000000000000005485834e00"]) 13:26:20 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r0, 0x5606, 0x3) [ 1468.561237] hfs: invalid gid -1 [ 1468.564668] hfs: unable to parse mount options 13:26:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) ioctl$KDDELIO(r1, 0x4b35, 0xc0) 13:26:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = msgget$private(0x0, 0x0) msgsnd(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x2000, 0x0) msgctl$MSG_INFO(r2, 0xc, &(0x7f0000000000)=""/99) syz_open_dev$tty1(0xc, 0x4, 0x1) 13:26:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3) 13:26:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x3aa87726, 0x0) write$FUSE_INIT(r1, &(0x7f0000000040)={0xfffffffffffffe1f, 0xfffffffffffffffe, 0x2, {0x7, 0x1f, 0x5, 0x415170, 0xfff, 0x1000, 0x1f, 0x9}}, 0x50) r2 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open$dir(&(0x7f00000000c0)='./file0\x00', 0x10000, 0x1a0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b30, &(0x7f0000000100)=""/103) 13:26:20 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r1, 0x5606, 0x3) [ 1468.780342] audit: type=1804 audit(1593177980.415:118): pid=21094 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir257447143/syzkaller.DwbfZN/5124/file0/bus" dev="sda1" ino=16619 res=1 13:26:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3) 13:26:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = msgget$private(0x0, 0x0) msgsnd(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x2000, 0x0) msgctl$MSG_INFO(r2, 0xc, &(0x7f0000000000)=""/99) 13:26:20 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r1, 0x5606, 0x3) 13:26:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r3, 0x4b30, &(0x7f0000000100)=""/103) r4 = socket$inet6(0xa, 0x3, 0x3a) r5 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r5, 0x81785501, &(0x7f0000000000)=""/247) [ 1468.898334] hfs: invalid gid -1 [ 1468.901656] hfs: unable to parse mount options 13:26:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet6(0xa, 0x3, 0x3a) open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:20 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r1, 0x5606, 0x3) 13:26:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3) 13:26:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = msgget$private(0x0, 0x0) msgctl$MSG_INFO(r2, 0xc, &(0x7f0000000000)=""/99) 13:26:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r1, 0x5606, 0x3) 13:26:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3) [ 1469.140764] hfs: invalid gid -1 [ 1469.144090] hfs: unable to parse mount options 13:26:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000000)=""/99) 13:26:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3) 13:26:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet6(0xa, 0x3, 0x3a) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r1, 0x5606, 0x3) 13:26:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000000)=""/99) 13:26:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3) 13:26:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r1, 0x5606, 0x3) [ 1469.382411] hfs: invalid gid -1 [ 1469.385735] hfs: unable to parse mount options 13:26:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3) 13:26:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000000)=""/99) 13:26:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3) 13:26:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3) 13:26:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000000)=""/99) [ 1469.593924] hfs: invalid gid -1 [ 1469.597735] hfs: unable to parse mount options 13:26:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r3, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r4, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r4, 0x0) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000000c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTALL(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x14, r5, 0x400, 0x70bd2a}, 0x14}, 0x1, 0x0, 0x0, 0x20000080}, 0x4048000) sendmsg$NLBL_MGMT_C_LISTDEF(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x74, r5, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @ipv4={[], [], @remote}}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x2}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x1f}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_DOMAIN={0x5, 0x1, '\x00'}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast1}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}]}, 0x74}, 0x1, 0x0, 0x0, 0x810}, 0x20004000) 13:26:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3) 13:26:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3) 13:26:21 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000000)=""/99) 13:26:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3) 13:26:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r1, 0x5606, 0x3) [ 1469.818393] hfs: invalid gid -1 [ 1469.829104] hfs: unable to parse mount options 13:26:21 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000000)=""/99) 13:26:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000000)=""/105) ioctl$TIOCGPTPEER(r1, 0x5441, 0xfffffffffffff7f9) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) 13:26:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x3) 13:26:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r1, 0x5606, 0x3) 13:26:21 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000000)=""/99) 13:26:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r1, 0x5606, 0x3) 13:26:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x3) 13:26:21 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000000)=""/99) [ 1470.102587] hfs: invalid gid -1 [ 1470.106012] hfs: unable to parse mount options 13:26:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x3) 13:26:21 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000000)=""/99) 13:26:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3) 13:26:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3) 13:26:22 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000000)=""/99) [ 1470.346531] hfs: invalid gid -1 [ 1470.354386] hfs: unable to parse mount options 13:26:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r2, 0x5606, 0x0) 13:26:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3) 13:26:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r2, 0x5606, 0x0) 13:26:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000000)=""/99) 13:26:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x3) 13:26:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000000)=""/99) 13:26:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r2, 0x5606, 0x0) [ 1470.631260] hfs: invalid gid -1 [ 1470.634595] hfs: unable to parse mount options 13:26:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000000)=""/99) 13:26:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x3) 13:26:22 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x3) 13:26:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000000)=""/99) 13:26:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r2, 0x5606, 0x0) 13:26:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000000)=""/99) [ 1470.927609] hfs: invalid gid -1 [ 1470.933208] hfs: unable to parse mount options 13:26:22 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) [ 1470.996938] hfs: invalid gid -1 [ 1471.005250] hfs: unable to parse mount options 13:26:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000000)=""/99) 13:26:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r2, 0x5606, 0x0) 13:26:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r2, 0x5606, 0x0) 13:26:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) [ 1471.156689] hfs: invalid gid -1 [ 1471.163112] hfs: unable to parse mount options 13:26:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000000)=""/99) 13:26:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) socket(0x10, 0x2, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:22 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000000)=""/99) 13:26:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000000)=""/99) [ 1471.323806] hfs: invalid gid -1 [ 1471.327641] hfs: unable to parse mount options 13:26:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000000)=""/99) 13:26:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) [ 1471.467703] hfs: invalid gid -1 [ 1471.473717] hfs: unable to parse mount options 13:26:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) socket(0x10, 0x2, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) [ 1471.507989] hfs: invalid gid -1 [ 1471.511317] hfs: unable to parse mount options 13:26:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000000)=""/99) 13:26:23 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000000)=""/99) [ 1471.675747] hfs: invalid gid -1 [ 1471.681667] hfs: unable to parse mount options [ 1471.689047] hfs: invalid gid -1 [ 1471.692359] hfs: unable to parse mount options 13:26:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgctl$MSG_INFO(0x0, 0xc, 0x0) 13:26:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) socket(0x10, 0x2, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgctl$MSG_INFO(0x0, 0xc, 0x0) [ 1471.864915] hfs: invalid gid -1 [ 1471.869074] hfs: unable to parse mount options 13:26:23 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgctl$MSG_INFO(0x0, 0xc, 0x0) [ 1472.045400] hfs: invalid gid -1 [ 1472.049182] hfs: unable to parse mount options 13:26:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3a) r2 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$mptcp(&(0x7f00000002c0)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_DEL_ADDR(r3, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x2c, r4, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x44040) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x4a}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r8, @ANYBLOB="0000400000000002280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@ipv4_newaddr={0x30, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0xa0, 0x0, r8}, [@IFA_LOCAL={0x8, 0x2, @multicast2}, @IFA_BROADCAST={0x8, 0x4, @broadcast}, @IFA_FLAGS={0x8, 0x8, 0x400}]}, 0x30}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x5c, r4, 0x800, 0x70bd2a, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private0={0xfc, 0x0, [], 0x1}}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @remote}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000) r9 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r10, 0x4b30, &(0x7f0000000100)=""/103) [ 1472.128034] hfs: invalid gid -1 [ 1472.131493] hfs: unable to parse mount options 13:26:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x22080, 0x20) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) read$snddsp(r2, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8923, &(0x7f0000001140)='lo\x00\x96o8\x0fd\xa1\xe3\xa1s\x92\x88$q\xb5\xa5u\x99\x8eTE\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\x03\x00\x00\x00\xdb\x9b\x1b\xc2\x8d;\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x91\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?0U\xd1%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbc') r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r3, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="1af5ef04f24731f2c060d7f7795993354b32e165cbe049a2f8d4cb0baf48ba8a8d24a25bf5f947d2a2fb747f57b749cf9c62d9a5ff0fda239f3b62d2e25f348b729db5ccf8a803713243c1d488c4e500fdf32076c48dad9cd788d7de97f2d261af80f7732a6ff7212ed42858ad143a04fefaa32713e893221c56b3e0de7da7f769648cdf0842db899987141b365e88589b0e90ca48d06cebe6375818f1cb70470fdbc069199f7579a8270ac7f3e5c0e97a443e1ae5ecffeba6bee1f0cc6f1d4bad41dbc6542432833810695afc0a5ac94f44b737c364ff581efe8a5740c95408b614fdee693363addeed7a73e2d8752150ffc8c91f7d4e54f646441b2ee4719335e0a39c19c2a5be56d9eed417970da27e0b2e6e4b32ae9c3332d6610eb762d102", @ANYRES16=r4, @ANYBLOB='\x00'/16], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="e801fb00", @ANYRES16=r4, @ANYBLOB="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"], 0x1e8}, 0x1, 0x0, 0x0, 0x1}, 0x4000) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000a00)=ANY=[@ANYBLOB="ac01005579ec181f92", @ANYRES16=r4, @ANYBLOB="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"], 0x1ac}, 0x1, 0x0, 0x0, 0x4000891}, 0x20048000) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000380)={&(0x7f0000000180)={0x1cc, r4, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x20, 0x8, 0x0, 0x1, [{0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x50df9d7f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8f}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xa0, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xd9bc146}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3a51}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x55f5cb4e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4eab}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7d89ca85}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x355e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xaa60}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2320970d}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd49d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x77ff34db}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x63132e82}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfba1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x92b6}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6b55b27d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdafd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x36eb896}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7b968a39}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0xf8, 0x8, 0x0, 0x1, [{0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xd1dc2c3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x76}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4abbf023}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x62}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x285cb19a}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x85}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d8e5574}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x17}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5b41117d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x401dd0f6}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d02930b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x155b8237}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5a78406f}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x200a823d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x50ea3ae9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd6}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x948307c}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5041f7f}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x93}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x294fd816}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x57}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x44}]}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x40000}, 0xc810) openat$cgroup_procs(r2, &(0x7f0000000540)='cgroup.procs\x00', 0x2, 0x0) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)={0x94, r4, 0x620, 0x70bd27, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x78, 0xc, 0x0, 0x1, [{0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4b9a3304}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc31f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xecb8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xef04}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x46a6a537}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3e52}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3a4406dc}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3b0c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb3ba}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xea19}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2f3583ee}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe50e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2b835c15}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}]}, 0x94}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000500)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000100)={0x394, r4, 0x2, 0x70bd2b, 0x25dfdbfc, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x134, 0xc, 0x0, 0x1, [{0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa508}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1d97}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2ddcaffb}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x41e0e289}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x19c133ac}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4ab98490}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfd06}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8c91}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1e4098c9}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x64a8f893}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3b4c8e6e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x100e17d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x677a}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1810}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe06}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc0c6}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4992}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7ecefbbe}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb16}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2c50a0f1}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5b24aea2}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x286e}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1bd727ef}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf1b7}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3ff9219a}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4bb007e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6f93}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x95e3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x418d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4303ab59}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2399ff2c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x12aa}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x19d7}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x53d47062}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x1dc, 0x8, 0x0, 0x1, [{0x54, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x20108852}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x306ef916}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7b60f219}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x82}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x9dce98}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4ffc42fe}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x36}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x20fb134c}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3730e623}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5ef0faf8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x149bfd4e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7b78c0b0}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe0}]}, {0x54, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3dee023f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x49a2afdc}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x57e9bb91}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x86}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xac}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x95}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe7}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x31d2a5dd}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbf}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x51}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc2}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x38}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe0}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xff}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x33}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1ba12116}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x54}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x459580}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6b57a8ca}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x36}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x18b2e466}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf3}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4669b8d5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x558918f5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4d83ba74}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xec}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x189c4995}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x31}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5, 0x3, 0x5}, {0x5}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x2}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x3c, 0x8, 0x0, 0x1, [{0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d4392eb}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6233656d}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x71}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3d24acce}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x40c0df35}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x617c1fd3}]}]}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x394}}, 0xc0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r4, 0x2, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8000) r5 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r6, 0x4b30, &(0x7f0000000100)=""/103) 13:26:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) socket(0x10, 0x2, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:23 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) [ 1472.254279] device lo entered promiscuous mode [ 1472.306320] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1472.339515] µ¥u™ŽTE×]b}¡Y­: renamed from lo 13:26:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) socket(0x10, 0x2, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:24 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) [ 1472.479875] hfs: invalid gid -1 [ 1472.501006] hfs: unable to parse mount options 13:26:24 executing program 4: r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r0, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x7, 0xfc17}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x1) sendmsg$nl_route(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@ipv6_getrule={0x1c, 0x22, 0x202, 0x70bd2a, 0x25dfdbfe, {0xa, 0x10, 0x0, 0x9, 0x2d, 0x0, 0x0, 0x0, 0x10000}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4008001}, 0x4000041) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r5 = socket(0xa, 0x1, 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r5, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB="200000ede3000000840000000200"/28, @ANYRES32=r7], 0x20}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r4, 0x84, 0x5, &(0x7f0000000080)={r7, @in6={{0xa, 0x4e23, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x100}}}, 0x84) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000040)={r7, 0x9130, 0x1, [0xff]}, 0xa) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r8, 0x4b31, &(0x7f0000000100)=""/103) 13:26:24 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r0, 0x0) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000080), &(0x7f0000000040)=0x4) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000180)={{0x1, 0x2, 0x3, 0x2, 0xf84}, 0x69a7, 0x9}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r1, 0x0) ioctl$SNDCTL_DSP_SETFMT(r1, 0xc0045005, &(0x7f0000000000)=0x1000) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f00000000c0)=""/100) 13:26:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) socket(0x10, 0x2, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = socket$inet6(0xa, 0x3, 0x3a) r4 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x3a) r6 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000080)=""/90) [ 1472.676633] hfs: invalid gid -1 [ 1472.686248] hfs: unable to parse mount options [ 1472.699438] audit: type=1800 audit(1593177984.335:119): pid=21514 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16421 res=0 13:26:24 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) [ 1472.836697] hfs: invalid gid -1 13:26:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) [ 1472.857277] hfs: unable to parse mount options [ 1472.888362] hfs: invalid gid -1 [ 1472.894267] hfs: unable to parse mount options 13:26:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = socket$inet6(0xa, 0x1, 0x3) r4 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) r5 = socket$inet6(0xa, 0x80000, 0x3a) r6 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @mcast1, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="200000ede3000000840000000200000000000000000000000000000083e76d85206e0c32b3bcc922a3b388918e11ef5b4a2a82b6ab3f27f1f15f9bae919252a35baca44f0fc3d8fc2b8a0a610d2f241f8bfb0715b2266e23ecc3820d4a6dc7d06e64a8a5b65ead1c408fc1b4", @ANYRES32=r7], 0x20}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000080)={r7, @in6={{0xa, 0x4e23, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x100}}}, 0x84) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32=r7, @ANYBLOB="6a000000ca8d3f7c8bc31b08098fc2398cf3178956a562a32dc8997520de60b0665e1eda14dd9b03847ded56fc3aa73f7f0d773a6c744ec47b4b03fdf1462a203d4f196e9a8f4ab37105b707b09a9cdb5f3aff3c92193721ceeac3cd0c92a21057bfd3045d6337ea9f339eab8374"], &(0x7f0000000180)=0x72) sendfile(r5, r6, 0x0, 0x0) r8 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r8, 0x0) r9 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101000, 0x0) write$P9_RWSTAT(r9, &(0x7f0000000040)={0xff07, 0x7f, 0x2}, 0x0) 13:26:24 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) [ 1473.059971] hfs: invalid gid -1 [ 1473.063307] hfs: unable to parse mount options [ 1473.069078] hfs: invalid gid -1 [ 1473.073614] hfs: unable to parse mount options 13:26:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet6(0xa, 0x3, 0x3a) open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) [ 1473.301396] hfs: invalid gid -1 [ 1473.309178] hfs: unable to parse mount options [ 1473.377013] hfs: invalid gid -1 [ 1473.380446] hfs: unable to parse mount options 13:26:25 executing program 4: r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r0, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x7, 0xfc17}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x1) sendmsg$nl_route(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@ipv6_getrule={0x1c, 0x22, 0x202, 0x70bd2a, 0x25dfdbfe, {0xa, 0x10, 0x0, 0x9, 0x2d, 0x0, 0x0, 0x0, 0x10000}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4008001}, 0x4000041) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r5 = socket(0xa, 0x1, 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r5, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB="200000ede3000000840000000200"/28, @ANYRES32=r7], 0x20}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r4, 0x84, 0x5, &(0x7f0000000080)={r7, @in6={{0xa, 0x4e23, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x100}}}, 0x84) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000040)={r7, 0x9130, 0x1, [0xff]}, 0xa) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r8, 0x4b31, &(0x7f0000000100)=""/103) 13:26:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200, 0x0) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x44, 0x140f, 0x10, 0x70bd25, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_CHARDEV_TYPE={0xa, 0x45, 'ipoib\x00'}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x8000}, 0x800) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) syz_open_dev$tty20(0xc, 0x4, 0x1) 13:26:25 executing program 0: syz_mount_image$jfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet6(0xa, 0x3, 0x3a) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = socket$inet6(0xa, 0x3, 0x3a) r4 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r4, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x2, 0x7, 0x3, 0x0, 0x0, {0xa, 0x0, 0x5}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x4083) [ 1473.622239] audit: type=1800 audit(1593177985.255:120): pid=21625 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=15824 res=0 13:26:25 executing program 0: syz_mount_image$jfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = socket$inet6(0xa, 0x3, 0x3a) r4 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r4, 0x541c, &(0x7f0000000000)) [ 1473.788696] hfs: invalid gid -1 [ 1473.792658] hfs: invalid gid -1 [ 1473.799370] hfs: unable to parse mount options [ 1473.810145] hfs: unable to parse mount options 13:26:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3a) r2 = open(&(0x7f0000000240)='./file0/bus\x00', 0x151b00, 0x0) sendfile(r1, r2, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x1, 0x6, 0x2, 0x3, 0x5}, 0x14) r3 = dup2(r0, r0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x2}}, 0x20) r6 = memfd_create(&(0x7f0000000000)='\x91\xba\x99|\xf0\x83\x05(\xd5\xecb\x99V\xdf\x92\xd57\x00\x00\x00\x92\xd3\xc7\xec\x8b\xbd\x836)\x15\xd7\'\"h\x87m-\xf5\xb1lI\xfbp\x17<>\xa6w\xc0\x9c^c\xde\x90[\xdc\xef\x12T\x11\xc7\x17\xda\xa9\x83\xd3\xec\x8bN\xa3\x1a\x0e\r+@\x88\xc6\xe3\xe8\xf8\xb5', 0x0) lseek(r6, 0xfffffffffffffffc, 0x4) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0xe20, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r5}}, 0x48) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r5}}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) r8 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r8, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r8, 0xc0145401, &(0x7f0000000180)={0x2, 0x3, 0x4, 0x3, 0x5}) ioctl$FS_IOC_SETVERSION(r4, 0x40087602, &(0x7f00000000c0)=0x80) ioctl$GIO_SCRNMAP(r7, 0x4b30, &(0x7f0000000100)=""/103) 13:26:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:25 executing program 0: syz_mount_image$jfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) [ 1474.199368] hfs: invalid gid -1 [ 1474.202695] hfs: unable to parse mount options [ 1474.208629] hfs: invalid gid -1 [ 1474.213100] hfs: unable to parse mount options 13:26:26 executing program 4: r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r0, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x7, 0xfc17}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x1) sendmsg$nl_route(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@ipv6_getrule={0x1c, 0x22, 0x202, 0x70bd2a, 0x25dfdbfe, {0xa, 0x10, 0x0, 0x9, 0x2d, 0x0, 0x0, 0x0, 0x10000}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4008001}, 0x4000041) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r5 = socket(0xa, 0x1, 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r5, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB="200000ede3000000840000000200"/28, @ANYRES32=r7], 0x20}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r4, 0x84, 0x5, &(0x7f0000000080)={r7, @in6={{0xa, 0x4e23, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x100}}}, 0x84) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000040)={r7, 0x9130, 0x1, [0xff]}, 0xa) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r8, 0x4b31, &(0x7f0000000100)=""/103) 13:26:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x2000, 0x0) ioctl$BLKDISCARD(r4, 0x1277, &(0x7f0000000080)=0x8) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ioctl$FS_IOC_SETVERSION(r3, 0x40087602, &(0x7f0000000000)) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) 13:26:26 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e21, 0x5, @private2, 0x7f}, @in={0x2, 0x4e20, @empty}, @in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e22, 0x1b0, @mcast1, 0x10000}, @in6={0xa, 0x4e24, 0x20, @private1, 0x6}, @in6={0xa, 0x4e20, 0x10200, @ipv4={[], [], @multicast2}, 0x5}], 0xb0) r3 = syz_open_dev$vbi(&(0x7f0000007c00)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_S_STD(r3, 0x40085618, &(0x7f0000007c40)) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) r5 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$VIDIOC_G_SLICED_VBI_CAP(r5, 0xc0745645, &(0x7f0000000040)={0x7, [0x2007, 0x7, 0x4, 0x6, 0x20, 0xffff, 0x40, 0x1, 0x8000, 0x6, 0x7ff, 0x7, 0x7f, 0xff, 0x4, 0x4, 0x3, 0x0, 0x0, 0x7, 0x4, 0xea, 0x6, 0x0, 0x1, 0x938b, 0x8000, 0x0, 0x787, 0x4, 0x1200, 0x6, 0x1ff, 0x1, 0x1003, 0x6, 0x200, 0xffc4, 0x20, 0x7, 0x2, 0xff7d, 0x5, 0x3, 0x8001, 0x4, 0x88cc, 0xfffa], 0x4}) ioctl$GIO_SCRNMAP(r4, 0x4b30, &(0x7f0000000100)=""/103) [ 1474.546771] audit: type=1800 audit(1593177986.185:121): pid=21708 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=15824 res=0 13:26:26 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) [ 1474.695359] hfs: invalid gid -1 [ 1474.700210] hfs: unable to parse mount options 13:26:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r4 = socket(0xa, 0x1, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/keys\x00', 0x0, 0x0) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r8, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0xe20, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r9}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r7, &(0x7f0000000280)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x9, @private2, 0xde38}, r9}}, 0x30) sendmmsg$inet_sctp(r4, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB="200000ede3000000840000000200"/28, @ANYRES32=r6], 0x20}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000080)={r6, @in6={{0xa, 0x4e23, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x100}}}, 0x84) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000000)={r6, 0x401}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000180)={r10, @in6={{0xa, 0x4e21, 0x9, @mcast1, 0x7f}}}, &(0x7f0000000080)=0x84) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) 13:26:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) [ 1474.907432] audit: type=1800 audit(1593177986.545:122): pid=21754 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16674 res=0 [ 1474.937288] hfs: invalid gid -1 [ 1474.946116] hfs: unable to parse mount options 13:26:26 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(0x0, &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) [ 1474.972251] hfs: invalid gid -1 [ 1474.984973] hfs: unable to parse mount options 13:26:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) [ 1475.182138] hfs: invalid gid -1 [ 1475.185464] hfs: unable to parse mount options 13:26:26 executing program 4: r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r0, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x7, 0xfc17}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x1) sendmsg$nl_route(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@ipv6_getrule={0x1c, 0x22, 0x202, 0x70bd2a, 0x25dfdbfe, {0xa, 0x10, 0x0, 0x9, 0x2d, 0x0, 0x0, 0x0, 0x10000}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4008001}, 0x4000041) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r5 = socket(0xa, 0x1, 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r5, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB="200000ede3000000840000000200"/28, @ANYRES32=r7], 0x20}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r4, 0x84, 0x5, &(0x7f0000000080)={r7, @in6={{0xa, 0x4e23, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x100}}}, 0x84) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000040)={r7, 0x9130, 0x1, [0xff]}, 0xa) syz_open_dev$tty1(0xc, 0x4, 0x1) 13:26:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x10001, 0x10}, 0xc) r3 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r3, 0x0) ioctl$DRM_IOCTL_GEM_CLOSE(r3, 0x40086409, &(0x7f0000000200)) fchmod(r2, 0x49) pipe(&(0x7f0000000000)) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) r5 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r5, 0x0) r6 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0)='batadv\x00') sendmsg$BATADV_CMD_GET_HARDIF(r5, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x2c, r6, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x3}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x508}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x841}, 0x4054) ioctl$GIO_SCRNMAP(r4, 0x4b30, &(0x7f0000000100)=""/103) r7 = socket$inet6(0xa, 0x3, 0x3a) r8 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r7, r8, 0x0, 0x0) sendmsg$IPSET_CMD_RENAME(r8, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x2c, 0x5, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz2\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz2\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40801}, 0x4000014) 13:26:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:26 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(0x0, &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) [ 1475.289905] hfs: invalid gid -1 [ 1475.293235] hfs: unable to parse mount options 13:26:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000000)={0x0, 0x2, 0xa77, 0x400}) [ 1475.424549] audit: type=1800 audit(1593177987.055:123): pid=21798 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16650 res=0 13:26:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3a) r2 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x4a}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r6, @ANYBLOB="0000400000000002280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@ipv4_newaddr={0x30, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0xa0, 0x0, r6}, [@IFA_LOCAL={0x8, 0x2, @multicast2}, @IFA_BROADCAST={0x8, 0x4, @broadcast}, @IFA_FLAGS={0x8, 0x8, 0x400}]}, 0x30}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) r7 = msgget$private(0x0, 0x137) msgctl$MSG_STAT_ANY(r7, 0xd, &(0x7f0000000300)=""/239) sendmsg$xdp(r2, &(0x7f0000000200)={&(0x7f0000000000)={0x2c, 0x2, r6, 0x3b}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000040)="a73a0216adb93d2443ee682ac5dabe6a936d29f22e41c70a6e210fb7df6f62396ce9a9d43e507ccca9a076e89f32d96a4a26e6a928517d8fcbdae50a23d9501c5989843595cdfbc452fec8dc59c9b9357d1f4784d6962f4da467ad2c3b0cbc11831b5952988b64dfc599c484796ea5", 0x6f}, {&(0x7f0000000180)="7d4a3a4c7c301118a79d2d78e675ce252a4c8e7c83ffbe77682f9f0fa66cfbdc8fd6143e6631093802afdfe25a13b9bbeb15a70be3f6481eb22b55d82821504cd0b5638a4942d3725f8f478f8a685f95e103d46dd293622b73708fee6f2a70a7afdead6134ed6e6d", 0x68}], 0x2, 0x0, 0x0, 0x8810}, 0x4000000) r8 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r9, 0x4b30, &(0x7f0000000100)=""/103) [ 1475.521273] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1475.550742] hfs: invalid gid -1 [ 1475.554071] hfs: unable to parse mount options [ 1475.566503] hfs: invalid gid -1 13:26:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r5, 0x80dc5521, &(0x7f0000000400)=""/238) r6 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, r4) r7 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r7) r8 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, r8) keyctl$KEYCTL_MOVE(0x1e, r3, r7, r8, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) [ 1475.569835] hfs: unable to parse mount options [ 1475.575543] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 13:26:27 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r0, 0x0) r1 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r1, 0x0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) r3 = socket$inet6(0xa, 0x3, 0x3a) r4 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x4001be) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r5, 0x4b30, &(0x7f0000000100)=""/103) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r7, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x2006c1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000180)={{{@in, @in=@private}}, {{@in6=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xe8) setsockopt$IPT_SO_SET_REPLACE(r6, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) 13:26:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8000008) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) ioctl$KDFONTOP_SET(r3, 0x4b72, &(0x7f0000000040)={0x0, 0x1, 0x20, 0x1e, 0x2c, &(0x7f0000000180)="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"}) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x9c) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r6, r5, 0x0, 0x20000000000000d8) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_SET_MPATH(r5, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000001280)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000000082f9e1cb971711", @ANYRES16=r7, @ANYBLOB="4ada942dc458fc7704db853c10a677882012d8c572a25a8fea8b5b71561a147c500ed7949f2ce4e4ec3129d6dd844bf334f0b3c506307641350a419b5339f7c82455b829497187e7d0dc34a4672a5359bd5e4bc1732fdf23ddef8e74cb7d0c76e705ca1587ea6457", @ANYBLOB="0c00990006000000"], 0x30}}, 0x24008080) sendmsg$NL80211_CMD_DEL_KEY(r4, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x50, r7, 0x800, 0x70bd26, 0x25dfdbfc, {}, [@NL80211_ATTR_KEY_TYPE={0x8}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac05}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac01}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x1c, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_KEY_TYPE={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x24040001}, 0x1) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000080)={0x3, 0x20, 0x39bc}) [ 1476.032047] hfs: invalid gid -1 [ 1476.037488] hfs: invalid gid -1 [ 1476.041077] hfs: unable to parse mount options [ 1476.046728] hfs: unable to parse mount options 13:26:27 executing program 4: r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r0, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x7, 0xfc17}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x1) sendmsg$nl_route(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@ipv6_getrule={0x1c, 0x22, 0x202, 0x70bd2a, 0x25dfdbfe, {0xa, 0x10, 0x0, 0x9, 0x2d, 0x0, 0x0, 0x0, 0x10000}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4008001}, 0x4000041) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r5 = socket(0xa, 0x1, 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r5, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB="200000ede3000000840000000200"/28, @ANYRES32=r7], 0x20}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r4, 0x84, 0x5, &(0x7f0000000080)={r7, @in6={{0xa, 0x4e23, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x100}}}, 0x84) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000040)={r7, 0x9130, 0x1, [0xff]}, 0xa) 13:26:27 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(0x0, &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0xa4000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) 13:26:27 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:28 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0xe4, 0x119300) 13:26:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000000)=""/103) [ 1476.464575] audit: type=1800 audit(1593177988.095:124): pid=21911 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16639 res=0 13:26:28 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) dup2(r0, r0) r1 = socket$inet6(0xa, 0x3, 0x3a) r2 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) r3 = socket$inet6(0xa, 0x3, 0x3a) r4 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0xd9d6) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r5, 0x4b30, &(0x7f0000000100)=""/103) 13:26:28 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', 0x0, 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) ptrace$pokeuser(0x6, r3, 0x9246, 0x0) syz_open_procfs(r3, &(0x7f0000000040)='fd\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/locks\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(r4, 0x4b30, &(0x7f0000000080)=""/99) [ 1476.634055] hfs: invalid gid -1 [ 1476.640547] hfs: unable to parse mount options 13:26:28 executing program 4: r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r0, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x7, 0xfc17}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x1) sendmsg$nl_route(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@ipv6_getrule={0x1c, 0x22, 0x202, 0x70bd2a, 0x25dfdbfe, {0xa, 0x10, 0x0, 0x9, 0x2d, 0x0, 0x0, 0x0, 0x10000}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4008001}, 0x4000041) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r5 = socket(0xa, 0x1, 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r5, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB="200000ede3000000840000000200"/28, @ANYRES32=r7], 0x20}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r4, 0x84, 0x5, &(0x7f0000000080)={r7, @in6={{0xa, 0x4e23, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x100}}}, 0x84) 13:26:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) ioctl$SNDCTL_DSP_SPEED(r3, 0xc0045002, &(0x7f0000000000)=0x7ff) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r4, 0x4b30, &(0x7f0000000100)=""/103) 13:26:28 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000000)='./file0\x00') accept4$unix(r1, &(0x7f0000000180), &(0x7f00000000c0)=0x6e, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r3, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r5 = socket(0xa, 0x1, 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r5, &(0x7f0000000800)=[{&(0x7f0000000240)=@in={0x2, 0x4e22, @rand_addr=0x64010102}, 0x10, &(0x7f0000000780)=[{&(0x7f0000000280)="362e015eab8e264933f3dafa9fe31d2f2ed91150e89c845676b44c252218534fcc92d632d2360acaf0fe08bbb21aa15ab889bbde0c0b427eeeb4891b149bc92e89e2b077bff18c7f7613a2507257121085b70f318e01407489e319f6ab78f288f5efe0796415ef47db25ce7ebee4c9ceec9a591bf560091efcefbc73be8e8aed4cf0e180a31310d235ea501fb5e2f89ad2b9874735c9fcaa7dd5a1facbcaca58163ee70fc550f8c494a71dbfa02a8714de0683c1430d045d88ad8110271c90004db6c5f4b633fa", 0xc7}, {&(0x7f0000000380)="8d1bb90ec3d53d7e140d7479b73e9b7f64a798a576384f89209759567e7cfe6c0765c82a97877bd4be36f77bf6d2c486e72ce09045b653ea236beee773964d02a038598a01d561920e9827d7e6d14f8448", 0x51}, {&(0x7f0000000400)="b38ff3cf850b21f5f24c4dac450aaa99288acf48789a7a3edd2850909552f3cc89955eab986b52f0f05141ca8bbedcb0e1e4dabf945d08371fe0163c08c34142715cd4be3b22ddf90af7eaaba45245421fab315365669d188a9914218a070bb74a7d16485bdf611f46c8", 0x6a}, {&(0x7f0000000480)="444dcb3f51e89afac49656b215113c3db2e957bc778f3d23885f05bdb5db51d48d8951c735cc1327f6274523afe7586eead26166e974cc550fdf41890285c52faf8a620d201499e3dffd7a123419d962226702c80a5eacbef17d2b935400086de82b1e12249e7925dd7cc9e63bd979d8cb09f8c1a446928d5527fa5e6b0a83b980ebd2b3c4a2542498497ecffbbce8e1ea145c78130456139c47b91a6d771fc63851", 0xa2}, {&(0x7f0000000840)="91921b665fe310d8d6dd12ab97460f718f0ff65f23cef8137b1fa5851352c692fdfa47c543acae70ae358752e4bc771713dc1e3fec2f8152d3f137a7a65f729f36e60f23be614f81ac36d1c66a9892ec3e0785389d", 0x55}, {&(0x7f00000005c0)="981cdd3d21ad120207d22767eaa39e347c92bdb7df17fac8349911b9b522d62829b38caf0afc67422f9e6fb1899f7a4799f4477f067bdabc24ac8c8c0b178dffd4b5d62ccf9b2f5283cde84b70e95f86f14239ed3e14505911f51986f30d4d481f69f81804609c9bc4e5f4f3bb79d51029a10238b2f576286286", 0x7a}, {&(0x7f0000000640)="758e7ae2f63879f5900da0aac954d0622c57e6198b93e19c7cd3007b6748dbcb4499964c4a049bf9d832b6911964", 0x2e}, {&(0x7f0000000680)="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", 0xff}], 0x8, 0x0, 0x0, 0x2000000}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r4, 0x84, 0x5, &(0x7f0000000080)={r7, @in6={{0xa, 0x4e23, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x100}}}, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000200)={r7, 0x1e3}, 0x8) ioctl$KVM_GET_DEVICE_ATTR(r3, 0x4018aee2, &(0x7f0000000080)={0x0, 0x8, 0x7, &(0x7f0000000040)=0x3}) 13:26:28 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', 0x0, 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) [ 1477.249180] audit: type=1800 audit(1593177988.886:125): pid=21969 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16656 res=0 13:26:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) prctl$PR_GET_FP_MODE(0x2e) r4 = socket$inet6(0xa, 0x3, 0x3a) r5 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x0) r6 = socket$inet6(0xa, 0x3, 0x3a) r7 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x0) r8 = dup(0xffffffffffffffff) fstat(r8, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r9, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@dev={0xac, 0x14, 0x14, 0x42}, 0x4e21, 0x0, 0x4e23, 0x7, 0x0, 0x0, 0x20, 0x1, 0x0, r9}, {0x1c8c, 0x6, 0xffffffff, 0xfffffffffffffffc, 0x6, 0x3, 0xffffffffffff8001, 0x6a2d4df6}, {0x6, 0x1, 0x6, 0x40}, 0x1, 0x6e6bbd, 0x2, 0x1, 0x5, 0x1}, {{@in=@multicast1, 0x4d3, 0xff}, 0xa, @in=@multicast2, 0x0, 0x0, 0x0, 0x5, 0x72843fa2, 0x30, 0x4}}, 0xe8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r7, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x100}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r10, 0x4}, 0x8) ioctl$GIO_SCRNMAP(r3, 0x4b30, &(0x7f0000000100)=""/103) [ 1477.301602] audit: type=1800 audit(1593177988.926:126): pid=21975 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16665 res=0 [ 1477.375324] hfs: invalid gid -1 13:26:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = socket$inet6(0xa, 0x3, 0x3a) r4 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000000)={0x73622a85, 0x1, 0x1}) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) [ 1477.399030] hfs: unable to parse mount options 13:26:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) r2 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r3, 0x4b30, &(0x7f0000000100)=""/103) listen(r0, 0x81) [ 1477.476396] hfs: invalid gid -1 [ 1477.479716] hfs: unable to parse mount options 13:26:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:29 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:29 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', 0x0, 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) [ 1477.715981] hfs: invalid gid -1 [ 1477.719307] hfs: unable to parse mount options [ 1477.806088] hfs: invalid gid -1 [ 1477.814041] hfs: unable to parse mount options 13:26:29 executing program 4: r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r0, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x7, 0xfc17}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x1) sendmsg$nl_route(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@ipv6_getrule={0x1c, 0x22, 0x202, 0x70bd2a, 0x25dfdbfe, {0xa, 0x10, 0x0, 0x9, 0x2d, 0x0, 0x0, 0x0, 0x10000}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4008001}, 0x4000041) open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r4 = socket(0xa, 0x1, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r4, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB="200000ede3000000840000000200"/28, @ANYRES32=r6], 0x20}], 0x1, 0x0) 13:26:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = socket$inet6(0xa, 0x3, 0x3a) r4 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f0000000000)=0x2, 0x4) 13:26:29 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:29 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) [ 1478.158789] audit: type=1800 audit(1593177989.796:127): pid=22056 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=15963 res=0 13:26:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)={0x5, 0x0, 0x2, 0x8, 0x1ff, 0x7}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r3, 0x4b30, &(0x7f0000000100)=""/103) 13:26:29 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:29 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x141000, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r4, 0x0) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r4, 0x80184132, &(0x7f0000000080)) ioctl$GIO_SCRNMAP(r3, 0x4b30, &(0x7f0000000100)=""/103) [ 1478.293642] hfs: invalid gid -1 [ 1478.298388] hfs: unable to parse mount options 13:26:30 executing program 5: r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmctl$IPC_RMID(r0, 0x0) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000180)=""/4096) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) r3 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400203) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r4, 0x4b30, &(0x7f0000000100)=""/103) 13:26:30 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = open(&(0x7f0000000100)='./file0\x00', 0x200200, 0x0) r4 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r4, 0x0) r5 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r5, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000080)=""/105) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0xe20, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r7}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r7, 0x1c, 0x0, @in={0x2, 0x4e20, @empty}}}, 0x90) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8000, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r8, 0x4040ae72, &(0x7f0000000040)={0x3, 0x4, 0x94d, 0x4, 0x5}) 13:26:30 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x10b301, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="40000000020801020000000000000000e7d51b445751d3716a479a000400022c00048008000109000079190800014000000401080001400000000908000140000080ce0800014000000005"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x80) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r2 = dup2(0xffffffffffffffff, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_pts(r2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r3, 0x4b30, &(0x7f0000000100)=""/103) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x44902, 0x0) ioctl$UI_DEV_DESTROY(r4, 0x5502) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f00000001c0)) [ 1478.497259] hfs: invalid gid -1 [ 1478.519886] hfs: unable to parse mount options 13:26:30 executing program 4: r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r0, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x7, 0xfc17}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x1) sendmsg$nl_route(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@ipv6_getrule={0x1c, 0x22, 0x202, 0x70bd2a, 0x25dfdbfe, {0xa, 0x10, 0x0, 0x9, 0x2d, 0x0, 0x0, 0x0, 0x10000}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4008001}, 0x4000041) open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r4 = socket(0xa, 0x1, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) 13:26:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:30 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:30 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r1, 0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x1000508) ioctl$GIO_SCRNMAP(r0, 0x4b30, &(0x7f0000000100)=""/103) 13:26:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000000)={{{@in6=@private2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0xe8) r3 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r3, 0x0) pipe(&(0x7f0000000280)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) ptrace$pokeuser(0x6, r4, 0x9246, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) fstat(r6, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r7, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f00000019c0)={0x7fffffff, 0x2, {r4}, {r7}, 0x2, 0x6}) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000001a00)={{0x1, r2, 0x0, r2, 0x0, 0x150, 0x9}, 0x0, 0x0, 0x9, 0x7, 0x101, 0x2, 0x6, 0x8000, 0x3f, 0x1, 0xffffffffffffffff, r8}) r9 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r10 = syz_open_dev$tty1(0xc, 0x4, 0x1) recvmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)=""/185, 0xb9}, {&(0x7f0000000280)=""/137, 0x89}, {&(0x7f0000000340)=""/58, 0x3a}, {&(0x7f0000000380)=""/235, 0xeb}, {&(0x7f0000000480)=""/35, 0x23}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/90, 0x5a}], 0x7, &(0x7f00000005c0)=""/39, 0x27}, 0x10000) ioctl$GIO_SCRNMAP(r10, 0x4b30, &(0x7f0000000100)=""/103) 13:26:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x53da02, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(r3, 0xc038563b, &(0x7f0000000040)={0x1, 0x0, {0x8001, 0x80000000, 0x9, 0x8}}) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) [ 1479.044334] audit: type=1800 audit(1593177990.676:128): pid=22135 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16667 res=0 13:26:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = socket$inet6(0xa, 0x3, 0x3a) r4 = open(&(0x7f0000000240)='./file0/bus\x00', 0x90200, 0x0) sendfile(r3, r4, 0x0, 0x0) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r6 = socket(0xa, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8000, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180), &(0x7f0000000200)=0x1a) close(r6) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000000180), 0x4d) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r6, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB="8d0bed0000ede30000008400000002000000", @ANYRES32=r8], 0x20}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r5, 0x84, 0x5, &(0x7f0000000080)={r8, @in6={{0xa, 0x4e23, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x100}}}, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000000)={r8, 0x1f, 0x30}, 0xc) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) 13:26:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) [ 1479.231426] audit: type=1800 audit(1593177990.856:129): pid=22156 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=15967 res=0 13:26:30 executing program 5: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$get_security(0x11, r1, &(0x7f0000000000)=""/199, 0xc7) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat(r3, &(0x7f0000000180)='./file0\x00', 0x10000, 0x90) ioctl$UFFDIO_COPY(r4, 0xc028aa03, &(0x7f00000001c0)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, 0x4000}) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000300)={0x9e0000, 0x3, 0x2, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)={0x990968, 0x4f44, [], @string=&(0x7f0000000440)=0x1}}) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x19}}, 0x800) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r9, @ANYBLOB="0000400001000000000000000c00010076657405"], 0x48}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@ipv4_newaddr={0x30, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0xa0, 0x0, r9}, [@IFA_LOCAL={0x8, 0x2, @multicast2}, @IFA_BROADCAST={0x8, 0x4, @broadcast}, @IFA_FLAGS={0x8, 0x8, 0x400}]}, 0x30}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000340)={@private0={0xfc, 0x0, [], 0x1}, 0x35, r9}) r10 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r10, 0x4b30, &(0x7f0000000100)=""/103) [ 1479.329877] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1479.356899] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1479.395332] hfs: invalid gid -1 [ 1479.398766] hfs: unable to parse mount options 13:26:31 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000000)={0x5, 0x3e, 0x8000}) ioctl$GIO_SCRNMAP(r1, 0x4b30, &(0x7f0000000100)=""/103) 13:26:31 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000080)=""/119) 13:26:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:31 executing program 4: r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r0, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x7, 0xfc17}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x1) sendmsg$nl_route(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@ipv6_getrule={0x1c, 0x22, 0x202, 0x70bd2a, 0x25dfdbfe, {0xa, 0x10, 0x0, 0x9, 0x2d, 0x0, 0x0, 0x0, 0x10000}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4008001}, 0x4000041) open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r4 = socket(0xa, 0x1, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) 13:26:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) syz_open_dev$tty1(0xc, 0x4, 0x2) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x488003, 0x0) ioctl$GIO_SCRNMAP(r3, 0x4b30, &(0x7f0000000000)=""/81) 13:26:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = add_key$fscrypt_provisioning(&(0x7f0000000000)='fscrypt-provisioning\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000180)={0x3, 0x0, "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"}, 0x1008, 0xfffffffffffffffd) keyctl$invalidate(0x15, r3) [ 1479.957770] audit: type=1800 audit(1593177991.596:130): pid=22202 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=15785 res=0 13:26:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$llc_int(r1, 0x10c, 0x8, &(0x7f0000000000)=0x400, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) [ 1480.065846] hfs: invalid gid -1 [ 1480.078214] hfs: unable to parse mount options [ 1480.081472] hfs: invalid gid -1 [ 1480.091674] hfs: unable to parse mount options 13:26:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0xc8000, 0x0) r3 = socket$inet6(0xa, 0x3, 0x3a) r4 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) bind$phonet(r4, &(0x7f0000000100)={0x23, 0x1, 0x1, 0x7f}, 0x10) r5 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r5, 0x0) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f00000000c0)={0x0, r5}) syz_open_dev$tty1(0xc, 0x4, 0x1) 13:26:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000080)={'nat\x00', 0x0, 0x3, 0x15, [], 0x4, &(0x7f0000000000)=[{}, {}, {}, {}], &(0x7f0000000040)=""/21}, &(0x7f0000000180)=0x78) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) r4 = accept4$netrom(r3, &(0x7f0000000280)={{0x3, @default}, [@rose, @bcast, @default, @default, @rose, @default, @default]}, &(0x7f0000000300)=0x48, 0x180800) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'wg0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000380)={'wg0\x00', r5}) r6 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) r8 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x240000, 0x0) ioctl$EVIOCGSW(r8, 0x8040451b, &(0x7f0000000200)=""/105) ioctl$GIO_SCRNMAP(r7, 0x4b30, &(0x7f0000000100)=""/103) [ 1480.127507] hfs: invalid gid -1 [ 1480.130832] hfs: unable to parse mount options 13:26:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(0x0, &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:31 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:31 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x202000, 0x0) ioctl$DRM_IOCTL_MODE_GETENCODER(r0, 0xc01464a6, &(0x7f0000000080)={0x3}) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x8}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000044}, 0x20000000) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x2) r3 = socket$inet6(0xa, 0x3, 0x3a) r4 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r5, 0xc0184908, &(0x7f00000003c0)={0x34, 0x0, &(0x7f0000000380)}) sendfile(r3, r4, 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r4, 0xc0184908, &(0x7f0000000280)={0x34, 0x0, &(0x7f00000000c0)}) keyctl$read(0xb, 0x0, &(0x7f0000000180)=""/250, 0xfa) ustat(0x5, &(0x7f0000000000)) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) 13:26:31 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r2 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r4, 0x4b30, &(0x7f0000000100)=""/103) [ 1480.435801] hfs: invalid gid -1 [ 1480.439129] hfs: unable to parse mount options 13:26:32 executing program 4: r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r0, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x7, 0xfc17}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x1) sendmsg$nl_route(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@ipv6_getrule={0x1c, 0x22, 0x202, 0x70bd2a, 0x25dfdbfe, {0xa, 0x10, 0x0, 0x9, 0x2d, 0x0, 0x0, 0x0, 0x10000}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4008001}, 0x4000041) open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r4 = socket(0xa, 0x1, 0x0) close(r4) socket$inet6_sctp(0xa, 0x10000000005, 0x84) 13:26:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x529102, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) r4 = socket$inet6(0xa, 0x3, 0x1d) r5 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x0) ioctl$KVM_S390_UCAS_MAP(r5, 0x4018ae50, &(0x7f0000000080)={0x6, 0x3, 0x7}) r6 = getpid() sched_setattr(r6, &(0x7f0000000180)={0x38, 0x1, 0x8, 0x9, 0x558c, 0x7, 0x3, 0x0, 0x80000000, 0x91}, 0x0) fchmod(r3, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r3, 0x4008af13, &(0x7f0000000040)={0x3}) bind$vsock_dgram(r2, &(0x7f00000000c0)={0x28, 0x0, 0x2710}, 0x10) 13:26:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = socket$inet6(0xa, 0x3, 0x3a) r4 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r4, 0xc0045006, &(0x7f0000000000)=0x6) 13:26:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:32 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(0x0, &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:32 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) ioctl$vim2m_VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "041db53a"}, 0x0, 0x0, @planes=0x0}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2ea4000036000505d25a80648c63940d0324fc6b10000a400a000048053582c137153e370948018000f01700d1bd", 0x33fe0}], 0x1}, 0x7a000000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_udp_int(r2, 0x11, 0xb, &(0x7f0000000000)=0x3, 0x4) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r3, 0x4b30, &(0x7f0000000100)=""/103) 13:26:32 executing program 5: socket$inet6(0xa, 0x3, 0x3a) r0 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(r0, 0xc1004111, &(0x7f0000000280)={0x6, [0x1, 0x100, 0x2f0], [{0x6, 0x60, 0x1, 0x0, 0x1, 0x1}, {0x3, 0x8000, 0x0, 0x1, 0x1, 0x1}, {0x837, 0x3ff, 0x1, 0x1, 0x1, 0x1}, {0x3, 0x2}, {0xc847, 0x6, 0x1, 0x1, 0x1, 0x1}, {0x88, 0xa541, 0x1, 0x0, 0x0, 0x1}, {0xfff, 0x6d, 0x1}, {0x8000, 0x8, 0x0, 0x0, 0x1}, {0x8, 0x10001, 0x1, 0x1, 0x1}, {0x4, 0x8, 0x0, 0x0, 0x1}, {0xffffffff, 0xfff, 0x1, 0x0, 0x0, 0x1}, {0x0, 0x7fffffff, 0x1, 0x1, 0x1}], 0x3}) sendfile(r0, r0, 0x0, 0x0) accept4$ax25(r0, 0x0, &(0x7f00000000c0), 0x80800) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/seq\x00', 0x11d201) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000080)='NLBL_CALIPSO\x00') ioctl$GIO_SCRNMAP(r5, 0x4b30, &(0x7f0000000180)=""/97) fcntl$setflags(r4, 0x2, 0x1) [ 1480.870357] audit: type=1800 audit(1593177992.506:131): pid=22302 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=15965 res=0 [ 1480.902430] netlink: 23550 bytes leftover after parsing attributes in process `syz-executor.2'. 13:26:32 executing program 4: r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r0, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x7, 0xfc17}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x1) sendmsg$nl_route(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@ipv6_getrule={0x1c, 0x22, 0x202, 0x70bd2a, 0x25dfdbfe, {0xa, 0x10, 0x0, 0x9, 0x2d, 0x0, 0x0, 0x0, 0x10000}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4008001}, 0x4000041) open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r4 = socket(0xa, 0x1, 0x0) close(r4) [ 1480.924957] hfs: invalid gid -1 [ 1480.931149] hfs: unable to parse mount options [ 1480.944657] netlink: zone id is out of range [ 1480.954741] netlink: zone id is out of range 13:26:32 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) ioctl$vim2m_VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "041db53a"}, 0x0, 0x0, @planes=0x0}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2ea4000036000505d25a80648c63940d0324fc6b10000a400a000048053582c137153e370948018000f01700d1bd", 0x33fe0}], 0x1}, 0x7a000000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_udp_int(r2, 0x11, 0xb, &(0x7f0000000000)=0x3, 0x4) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r3, 0x4b30, &(0x7f0000000100)=""/103) [ 1480.974285] netlink: 23550 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1480.990527] netlink: zone id is out of range [ 1481.000501] netlink: zone id is out of range 13:26:32 executing program 4: r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r0, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x7, 0xfc17}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x1) sendmsg$nl_route(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@ipv6_getrule={0x1c, 0x22, 0x202, 0x70bd2a, 0x25dfdbfe, {0xa, 0x10, 0x0, 0x9, 0x2d, 0x0, 0x0, 0x0, 0x10000}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4008001}, 0x4000041) open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) socket(0xa, 0x1, 0x0) [ 1481.064842] audit: type=1800 audit(1593177992.696:132): pid=22337 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=15824 res=0 13:26:32 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:26:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(0x0, &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) [ 1481.164560] hfs: invalid gid -1 [ 1481.168798] hfs: unable to parse mount options [ 1481.187365] netlink: 23550 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1481.202174] netlink: zone id is out of range 13:26:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) [ 1481.246381] netlink: zone id is out of range 13:26:32 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) ioctl$vim2m_VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "041db53a"}, 0x0, 0x0, @planes=0x0}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2ea4000036000505d25a80648c63940d0324fc6b10000a400a000048053582c137153e370948018000f01700d1bd", 0x33fe0}], 0x1}, 0x7a000000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_udp_int(r2, 0x11, 0xb, &(0x7f0000000000)=0x3, 0x4) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r3, 0x4b30, &(0x7f0000000100)=""/103) [ 1481.288875] audit: type=1800 audit(1593177992.926:133): pid=22347 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16667 res=0 13:26:33 executing program 4: r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r0, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x7, 0xfc17}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x1) sendmsg$nl_route(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@ipv6_getrule={0x1c, 0x22, 0x202, 0x70bd2a, 0x25dfdbfe, {0xa, 0x10, 0x0, 0x9, 0x2d, 0x0, 0x0, 0x0, 0x10000}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4008001}, 0x4000041) open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) [ 1481.400022] netlink: 23550 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1481.432114] hfs: invalid gid -1 [ 1481.440632] netlink: zone id is out of range [ 1481.454592] hfs: unable to parse mount options [ 1481.469372] hfs: can't find a HFS filesystem on dev loop0 [ 1481.483924] netlink: zone id is out of range 13:26:33 executing program 4: r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r0, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x7, 0xfc17}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x1) sendmsg$nl_route(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@ipv6_getrule={0x1c, 0x22, 0x202, 0x70bd2a, 0x25dfdbfe, {0xa, 0x10, 0x0, 0x9, 0x2d, 0x0, 0x0, 0x0, 0x10000}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4008001}, 0x4000041) 13:26:33 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1481.527197] audit: type=1800 audit(1593177993.166:134): pid=22387 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16697 res=0 13:26:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:33 executing program 4: r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r0, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x7, 0xfc17}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x1) 13:26:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', 0x0, 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:33 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) ioctl$vim2m_VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "041db53a"}, 0x0, 0x0, @planes=0x0}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2ea4000036000505d25a80648c63940d0324fc6b10000a400a000048053582c137153e370948018000f01700d1bd", 0x33fe0}], 0x1}, 0x7a000000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_udp_int(r2, 0x11, 0xb, &(0x7f0000000000)=0x3, 0x4) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r3, 0x4b30, &(0x7f0000000100)=""/103) 13:26:33 executing program 4: r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r0, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x7, 0xfc17}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) socket$netlink(0x10, 0x3, 0x1) [ 1481.771931] hfs: can't find a HFS filesystem on dev loop0 [ 1481.775692] netlink: 23550 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1481.823568] netlink: zone id is out of range [ 1481.834897] netlink: zone id is out of range [ 1481.841615] hfs: invalid gid -1 [ 1481.845123] hfs: unable to parse mount options 13:26:33 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:26:33 executing program 4: r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r0, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x7, 0xfc17}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) socket$netlink(0x10, 0x3, 0x1) 13:26:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', 0x0, 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:33 executing program 4: r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r0, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x7, 0xfc17}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) socket$netlink(0x10, 0x3, 0x1) [ 1482.139328] hfs: can't find a HFS filesystem on dev loop0 13:26:33 executing program 4: r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r0, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x7, 0xfc17}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x1) 13:26:33 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC]) [ 1482.316743] hfs: invalid gid -1 [ 1482.320406] hfs: unable to parse mount options 13:26:34 executing program 4: r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r0, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x7, 0xfc17}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x1) 13:26:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', 0x0, 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:34 executing program 2: syz_mount_image$jfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:34 executing program 4: r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r0, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x7, 0xfc17}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x1) [ 1482.492943] hfs: invalid gid -1 [ 1482.514709] hfs: unable to parse mount options 13:26:34 executing program 4: r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r0, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x7, 0xfc17}) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x1) 13:26:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x22080, 0x20) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) read$snddsp(r2, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8923, &(0x7f0000001140)='lo\x00\x96o8\x0fd\xa1\xe3\xa1s\x92\x88$q\xb5\xa5u\x99\x8eTE\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\x03\x00\x00\x00\xdb\x9b\x1b\xc2\x8d;\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x91\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?0U\xd1%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbc') r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r3, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES16=r4, @ANYBLOB='\x00'/16], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="e801fb00", @ANYRES16=r4, @ANYBLOB="000427bd7000fbdbdf250400000064000c801c000b8008000a007c06000008000a00d6390000080009007f3b3d0444000b80080009001857525108000900b5f7502f08000a0045950000080009000571512d08000900c31a216b08000a00bab90000080009008807df2508000a00856d0000240004800500030005000000050003000500000005000300060000000500030005000000d0000c804c000b8008000a00ff36000008000900b63c865308000900c7eae73b0800090038887170080009005ff6ba6f08000a008d55000008000a00236b000008000a006356000008000a0029fc00000c000b8008000900ed97503e2c000b8008000a00b805000008000a00ea98000008000a00744f000008000900771e9004080009005b4267240c000b8008000a00444300003c000b8008000900f018751308000a00177d000008000900475b8971080009002c426e30080009004595d45808000a00ec7f000008000a006ff000007c0008803c0007800800050017034e6b08000500e8893b1b080005004639010608000600ec00000008000600e2000000080005000248f21b08000500aec7bc1414000780080006005a000000080005003e61fe541c00078008000600b00000000800060082000000080005000b64af6f0c000780c4fe060079000000"], 0x1e8}, 0x1, 0x0, 0x0, 0x1}, 0x4000) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000a00)=ANY=[@ANYBLOB="ac01005579ec181f92", @ANYRES16=r4, @ANYBLOB="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"], 0x1ac}, 0x1, 0x0, 0x0, 0x4000891}, 0x20048000) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000380)={&(0x7f0000000180)={0x1cc, r4, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x20, 0x8, 0x0, 0x1, [{0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x50df9d7f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8f}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xa0, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xd9bc146}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3a51}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x55f5cb4e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4eab}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7d89ca85}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x355e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xaa60}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2320970d}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd49d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x77ff34db}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x63132e82}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfba1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x92b6}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6b55b27d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdafd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x36eb896}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7b968a39}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0xf8, 0x8, 0x0, 0x1, [{0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xd1dc2c3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x76}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4abbf023}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x62}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x285cb19a}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x85}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d8e5574}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x17}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5b41117d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x401dd0f6}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d02930b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x155b8237}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5a78406f}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x200a823d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x50ea3ae9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd6}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x948307c}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5041f7f}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x93}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x294fd816}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x57}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x44}]}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x40000}, 0xc810) openat$cgroup_procs(r2, &(0x7f0000000540)='cgroup.procs\x00', 0x2, 0x0) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)={0x94, r4, 0x620, 0x70bd27, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x78, 0xc, 0x0, 0x1, [{0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4b9a3304}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc31f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xecb8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xef04}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x46a6a537}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3e52}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3a4406dc}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3b0c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb3ba}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xea19}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2f3583ee}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe50e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2b835c15}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}]}, 0x94}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000500)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000100)={0x394, r4, 0x2, 0x70bd2b, 0x25dfdbfc, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x134, 0xc, 0x0, 0x1, [{0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa508}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1d97}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2ddcaffb}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x41e0e289}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x19c133ac}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4ab98490}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfd06}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8c91}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1e4098c9}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x64a8f893}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3b4c8e6e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x100e17d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x677a}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1810}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe06}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc0c6}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4992}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7ecefbbe}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb16}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2c50a0f1}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5b24aea2}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x286e}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1bd727ef}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf1b7}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3ff9219a}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4bb007e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6f93}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x95e3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x418d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4303ab59}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2399ff2c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x12aa}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x19d7}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x53d47062}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x1dc, 0x8, 0x0, 0x1, [{0x54, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x20108852}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x306ef916}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7b60f219}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x82}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x9dce98}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4ffc42fe}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x36}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x20fb134c}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3730e623}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5ef0faf8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x149bfd4e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7b78c0b0}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe0}]}, {0x54, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3dee023f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x49a2afdc}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x57e9bb91}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x86}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xac}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x95}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe7}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x31d2a5dd}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbf}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x51}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc2}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x38}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe0}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xff}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x33}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1ba12116}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x54}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x459580}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6b57a8ca}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x36}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x18b2e466}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf3}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4669b8d5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x558918f5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4d83ba74}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xec}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x189c4995}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x31}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5, 0x3, 0x5}, {0x5}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x2}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x3c, 0x8, 0x0, 0x1, [{0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d4392eb}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6233656d}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x71}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3d24acce}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x40c0df35}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x617c1fd3}]}]}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x394}}, 0xc0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r4, 0x2, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8000) r5 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r6, 0x4b30, &(0x7f0000000100)=""/103) 13:26:34 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>']) 13:26:34 executing program 4: r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r0, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x7, 0xfc17}) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x1) 13:26:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:34 executing program 4: r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r0, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x7, 0xfc17}) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x1) 13:26:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0x100, {{0xa, 0x4e24, 0x20000, @empty, 0xffff}}}, 0x88) r3 = open(&(0x7f0000000000)='./file0\x00', 0x40100, 0x108) ioctl$SG_SET_TIMEOUT(r3, 0x2201, &(0x7f0000000040)=0x27c) r4 = socket$inet6(0xa, 0x3, 0x3a) r5 = open(&(0x7f0000000240)='./file0\x00', 0x410040, 0x20) sendfile(r4, r5, 0x0, 0x0) ioctl$PIO_UNIMAPCLR(r5, 0x4b68, &(0x7f0000000080)={0x1000, 0x7ff, 0x43}) r6 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r6, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) ioctl$GIO_SCRNMAP(r2, 0x4b44, &(0x7f0000000100)=""/103) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ioctl$sock_SIOCADDRT(r7, 0x890b, &(0x7f0000000340)={0x0, @generic={0x3, "36c3bcf62f14df19970219d5060c"}, @generic={0x3, "227eaaa790380100"}, @nl=@proc={0x10, 0x0, 0x25dfdbfe, 0x10000000}, 0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)='veth1_to_hsr\x00', 0x7fffffff, 0xc8, 0x421}) r8 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r8, 0x0) ioctl$TIOCGDEV(r8, 0x80045432, &(0x7f00000002c0)) 13:26:34 executing program 4: r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x1) [ 1483.048286] hfs: invalid gid -1 [ 1483.056876] hfs: unable to parse mount options [ 1483.065715] hfs: invalid gid -1 [ 1483.082856] hfs: unable to parse mount options 13:26:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0x100, {{0xa, 0x4e24, 0x20000, @empty, 0xffff}}}, 0x88) r3 = open(&(0x7f0000000000)='./file0\x00', 0x40100, 0x108) ioctl$SG_SET_TIMEOUT(r3, 0x2201, &(0x7f0000000040)=0x27c) r4 = socket$inet6(0xa, 0x3, 0x3a) r5 = open(&(0x7f0000000240)='./file0\x00', 0x410040, 0x20) sendfile(r4, r5, 0x0, 0x0) ioctl$PIO_UNIMAPCLR(r5, 0x4b68, &(0x7f0000000080)={0x1000, 0x7ff, 0x43}) r6 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r6, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) ioctl$GIO_SCRNMAP(r2, 0x4b44, &(0x7f0000000100)=""/103) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ioctl$sock_SIOCADDRT(r7, 0x890b, &(0x7f0000000340)={0x0, @generic={0x3, "36c3bcf62f14df19970219d5060c"}, @generic={0x3, "227eaaa790380100"}, @nl=@proc={0x10, 0x0, 0x25dfdbfe, 0x10000000}, 0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)='veth1_to_hsr\x00', 0x7fffffff, 0xc8, 0x421}) r8 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r8, 0x0) ioctl$TIOCGDEV(r8, 0x80045432, &(0x7f00000002c0)) 13:26:34 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX]) 13:26:34 executing program 4: creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x1) 13:26:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0x100, {{0xa, 0x4e24, 0x20000, @empty, 0xffff}}}, 0x88) r3 = open(&(0x7f0000000000)='./file0\x00', 0x40100, 0x108) ioctl$SG_SET_TIMEOUT(r3, 0x2201, &(0x7f0000000040)=0x27c) r4 = socket$inet6(0xa, 0x3, 0x3a) r5 = open(&(0x7f0000000240)='./file0\x00', 0x410040, 0x20) sendfile(r4, r5, 0x0, 0x0) ioctl$PIO_UNIMAPCLR(r5, 0x4b68, &(0x7f0000000080)={0x1000, 0x7ff, 0x43}) r6 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r6, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) ioctl$GIO_SCRNMAP(r2, 0x4b44, &(0x7f0000000100)=""/103) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ioctl$sock_SIOCADDRT(r7, 0x890b, &(0x7f0000000340)={0x0, @generic={0x3, "36c3bcf62f14df19970219d5060c"}, @generic={0x3, "227eaaa790380100"}, @nl=@proc={0x10, 0x0, 0x25dfdbfe, 0x10000000}, 0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)='veth1_to_hsr\x00', 0x7fffffff, 0xc8, 0x421}) r8 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r8, 0x0) ioctl$TIOCGDEV(r8, 0x80045432, &(0x7f00000002c0)) 13:26:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x1) 13:26:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0x100, {{0xa, 0x4e24, 0x20000, @empty, 0xffff}}}, 0x88) r3 = open(&(0x7f0000000000)='./file0\x00', 0x40100, 0x108) ioctl$SG_SET_TIMEOUT(r3, 0x2201, &(0x7f0000000040)=0x27c) r4 = socket$inet6(0xa, 0x3, 0x3a) r5 = open(&(0x7f0000000240)='./file0\x00', 0x410040, 0x20) sendfile(r4, r5, 0x0, 0x0) ioctl$PIO_UNIMAPCLR(r5, 0x4b68, &(0x7f0000000080)={0x1000, 0x7ff, 0x43}) r6 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r6, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) ioctl$GIO_SCRNMAP(r2, 0x4b44, &(0x7f0000000100)=""/103) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ioctl$sock_SIOCADDRT(r7, 0x890b, &(0x7f0000000340)={0x0, @generic={0x3, "36c3bcf62f14df19970219d5060c"}, @generic={0x3, "227eaaa790380100"}, @nl=@proc={0x10, 0x0, 0x25dfdbfe, 0x10000000}, 0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)='veth1_to_hsr\x00', 0x7fffffff, 0xc8, 0x421}) r8 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r8, 0x0) [ 1483.368576] hfs: invalid gid -1 [ 1483.371902] hfs: unable to parse mount options 13:26:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x1) 13:26:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0x100, {{0xa, 0x4e24, 0x20000, @empty, 0xffff}}}, 0x88) r3 = open(&(0x7f0000000000)='./file0\x00', 0x40100, 0x108) ioctl$SG_SET_TIMEOUT(r3, 0x2201, &(0x7f0000000040)=0x27c) r4 = socket$inet6(0xa, 0x3, 0x3a) r5 = open(&(0x7f0000000240)='./file0\x00', 0x410040, 0x20) sendfile(r4, r5, 0x0, 0x0) ioctl$PIO_UNIMAPCLR(r5, 0x4b68, &(0x7f0000000080)={0x1000, 0x7ff, 0x43}) r6 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r6, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) ioctl$GIO_SCRNMAP(r2, 0x4b44, &(0x7f0000000100)=""/103) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ioctl$sock_SIOCADDRT(r7, 0x890b, &(0x7f0000000340)={0x0, @generic={0x3, "36c3bcf62f14df19970219d5060c"}, @generic={0x3, "227eaaa790380100"}, @nl=@proc={0x10, 0x0, 0x25dfdbfe, 0x10000000}, 0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)='veth1_to_hsr\x00', 0x7fffffff, 0xc8, 0x421}) creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) 13:26:35 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX]) 13:26:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) [ 1483.504628] hfs: invalid gid -1 [ 1483.514930] hfs: unable to parse mount options 13:26:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x1) 13:26:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0x100, {{0xa, 0x4e24, 0x20000, @empty, 0xffff}}}, 0x88) r3 = open(&(0x7f0000000000)='./file0\x00', 0x40100, 0x108) ioctl$SG_SET_TIMEOUT(r3, 0x2201, &(0x7f0000000040)=0x27c) r4 = socket$inet6(0xa, 0x3, 0x3a) r5 = open(&(0x7f0000000240)='./file0\x00', 0x410040, 0x20) sendfile(r4, r5, 0x0, 0x0) ioctl$PIO_UNIMAPCLR(r5, 0x4b68, &(0x7f0000000080)={0x1000, 0x7ff, 0x43}) r6 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r6, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) ioctl$GIO_SCRNMAP(r2, 0x4b44, &(0x7f0000000100)=""/103) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ioctl$sock_SIOCADDRT(r7, 0x890b, &(0x7f0000000340)={0x0, @generic={0x3, "36c3bcf62f14df19970219d5060c"}, @generic={0x3, "227eaaa790380100"}, @nl=@proc={0x10, 0x0, 0x25dfdbfe, 0x10000000}, 0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)='veth1_to_hsr\x00', 0x7fffffff, 0xc8, 0x421}) 13:26:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x1) [ 1483.722283] hfs: invalid gid -1 [ 1483.730815] hfs: unable to parse mount options 13:26:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0x100, {{0xa, 0x4e24, 0x20000, @empty, 0xffff}}}, 0x88) r3 = open(&(0x7f0000000000)='./file0\x00', 0x40100, 0x108) ioctl$SG_SET_TIMEOUT(r3, 0x2201, &(0x7f0000000040)=0x27c) r4 = socket$inet6(0xa, 0x3, 0x3a) r5 = open(&(0x7f0000000240)='./file0\x00', 0x410040, 0x20) sendfile(r4, r5, 0x0, 0x0) ioctl$PIO_UNIMAPCLR(r5, 0x4b68, &(0x7f0000000080)={0x1000, 0x7ff, 0x43}) r6 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r6, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) ioctl$GIO_SCRNMAP(r2, 0x4b44, &(0x7f0000000100)=""/103) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) 13:26:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x1) 13:26:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) [ 1483.858024] hfs: invalid gid -1 [ 1483.860853] hfs: invalid gid -1 [ 1483.861745] hfs: unable to parse mount options [ 1483.864733] hfs: unable to parse mount options 13:26:35 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=']) 13:26:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0x100, {{0xa, 0x4e24, 0x20000, @empty, 0xffff}}}, 0x88) r3 = open(&(0x7f0000000000)='./file0\x00', 0x40100, 0x108) ioctl$SG_SET_TIMEOUT(r3, 0x2201, &(0x7f0000000040)=0x27c) r4 = socket$inet6(0xa, 0x3, 0x3a) r5 = open(&(0x7f0000000240)='./file0\x00', 0x410040, 0x20) sendfile(r4, r5, 0x0, 0x0) ioctl$PIO_UNIMAPCLR(r5, 0x4b68, &(0x7f0000000080)={0x1000, 0x7ff, 0x43}) r6 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r6, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) ioctl$GIO_SCRNMAP(r2, 0x4b44, &(0x7f0000000100)=""/103) socket$inet_tcp(0x2, 0x1, 0x0) 13:26:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x1) 13:26:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0x100, {{0xa, 0x4e24, 0x20000, @empty, 0xffff}}}, 0x88) r3 = open(&(0x7f0000000000)='./file0\x00', 0x40100, 0x108) ioctl$SG_SET_TIMEOUT(r3, 0x2201, &(0x7f0000000040)=0x27c) r4 = socket$inet6(0xa, 0x3, 0x3a) r5 = open(&(0x7f0000000240)='./file0\x00', 0x410040, 0x20) sendfile(r4, r5, 0x0, 0x0) ioctl$PIO_UNIMAPCLR(r5, 0x4b68, &(0x7f0000000080)={0x1000, 0x7ff, 0x43}) r6 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r6, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) ioctl$GIO_SCRNMAP(r2, 0x4b44, &(0x7f0000000100)=""/103) 13:26:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x1) 13:26:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:35 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=']) 13:26:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0x100, {{0xa, 0x4e24, 0x20000, @empty, 0xffff}}}, 0x88) r2 = open(&(0x7f0000000000)='./file0\x00', 0x40100, 0x108) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f0000000040)=0x27c) r3 = socket$inet6(0xa, 0x3, 0x3a) r4 = open(&(0x7f0000000240)='./file0\x00', 0x410040, 0x20) sendfile(r3, r4, 0x0, 0x0) ioctl$PIO_UNIMAPCLR(r4, 0x4b68, &(0x7f0000000080)={0x1000, 0x7ff, 0x43}) r5 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r5, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) 13:26:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x1) 13:26:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0x100, {{0xa, 0x4e24, 0x20000, @empty, 0xffff}}}, 0x88) r2 = open(&(0x7f0000000000)='./file0\x00', 0x40100, 0x108) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f0000000040)=0x27c) r3 = socket$inet6(0xa, 0x3, 0x3a) r4 = open(&(0x7f0000000240)='./file0\x00', 0x410040, 0x20) sendfile(r3, r4, 0x0, 0x0) ioctl$PIO_UNIMAPCLR(r4, 0x4b68, &(0x7f0000000080)={0x1000, 0x7ff, 0x43}) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) 13:26:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x1) 13:26:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@gid={'gid'}}]}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0x100, {{0xa, 0x4e24, 0x20000, @empty, 0xffff}}}, 0x88) r2 = open(&(0x7f0000000000)='./file0\x00', 0x40100, 0x108) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f0000000040)=0x27c) r3 = socket$inet6(0xa, 0x3, 0x3a) r4 = open(&(0x7f0000000240)='./file0\x00', 0x410040, 0x20) sendfile(r3, r4, 0x0, 0x0) ioctl$PIO_UNIMAPCLR(r4, 0x4b68, &(0x7f0000000080)={0x1000, 0x7ff, 0x43}) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) [ 1484.499911] hfs: invalid gid -1 [ 1484.502460] hfs: unable to parse mount options [ 1484.503301] hfs: unable to parse mount options 13:26:36 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=']) 13:26:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x1) 13:26:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:26:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0x100, {{0xa, 0x4e24, 0x20000, @empty, 0xffff}}}, 0x88) r2 = open(&(0x7f0000000000)='./file0\x00', 0x40100, 0x108) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f0000000040)=0x27c) r3 = socket$inet6(0xa, 0x3, 0x3a) r4 = open(&(0x7f0000000240)='./file0\x00', 0x410040, 0x20) sendfile(r3, r4, 0x0, 0x0) ioctl$PIO_UNIMAPCLR(r4, 0x4b68, &(0x7f0000000080)={0x1000, 0x7ff, 0x43}) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) 13:26:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) socket$netlink(0x10, 0x3, 0x1) 13:26:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0x100, {{0xa, 0x4e24, 0x20000, @empty, 0xffff}}}, 0x88) r2 = open(&(0x7f0000000000)='./file0\x00', 0x40100, 0x108) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f0000000040)=0x27c) r3 = socket$inet6(0xa, 0x3, 0x3a) r4 = open(&(0x7f0000000240)='./file0\x00', 0x410040, 0x20) sendfile(r3, r4, 0x0, 0x0) r5 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r5, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) 13:26:36 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYRESHEX]) 13:26:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0x100, {{0xa, 0x4e24, 0x20000, @empty, 0xffff}}}, 0x88) r2 = open(&(0x7f0000000000)='./file0\x00', 0x40100, 0x108) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f0000000040)=0x27c) socket$inet6(0xa, 0x3, 0x3a) open(&(0x7f0000000240)='./file0\x00', 0x410040, 0x20) r3 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) 13:26:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) socket$netlink(0x10, 0x3, 0x1) [ 1484.858418] hfs: can't find a HFS filesystem on dev loop1 13:26:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:26:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0x100, {{0xa, 0x4e24, 0x20000, @empty, 0xffff}}}, 0x88) r2 = open(&(0x7f0000000000)='./file0\x00', 0x40100, 0x108) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f0000000040)=0x27c) socket$inet6(0xa, 0x3, 0x3a) r3 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) 13:26:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) socket$netlink(0x10, 0x3, 0x1) [ 1485.026603] hfs: invalid gid -1 [ 1485.029930] hfs: unable to parse mount options 13:26:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(0x0, &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) [ 1485.067038] hfs: unable to parse mount options 13:26:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x0) 13:26:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0x100, {{0xa, 0x4e24, 0x20000, @empty, 0xffff}}}, 0x88) r2 = open(&(0x7f0000000000)='./file0\x00', 0x40100, 0x108) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f0000000040)=0x27c) r3 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) 13:26:36 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYRESHEX]) 13:26:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:26:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x0) 13:26:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0x100, {{0xa, 0x4e24, 0x20000, @empty, 0xffff}}}, 0x88) open(&(0x7f0000000000)='./file0\x00', 0x40100, 0x108) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) 13:26:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(0x0, &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) [ 1485.400583] hfs: unable to parse mount options 13:26:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x0) 13:26:37 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYRESHEX]) 13:26:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0x100, {{0xa, 0x4e24, 0x20000, @empty, 0xffff}}}, 0x88) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) 13:26:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC]) 13:26:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r2, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x14c, 0x0, 0x9, 0x101, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x9}}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0xf346}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x6}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x9}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x1000}}, @NFCTH_TUPLE={0x60, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x44810}, 0x14008048) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ppoll(&(0x7f00000003c0)=[{0xffffffffffffffff, 0x4008}, {r1, 0x1004}, {r3, 0xc620}, {r1, 0x8000}, {r0, 0x200}, {r4, 0x104}], 0x6, &(0x7f0000000400)={0x0, 0x3938700}, &(0x7f0000000440)={[0x3]}, 0x8) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000380)) ioctl$TIOCL_PASTESEL(r5, 0x541c, &(0x7f0000000000)) ioctl$GIO_SCRNMAP(r5, 0x4b30, &(0x7f0000000100)=""/103) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r6, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) socket$nl_generic(0x10, 0x3, 0x10) 13:26:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) 13:26:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(0x0, &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r2, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x14c, 0x0, 0x9, 0x101, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x9}}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0xf346}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x6}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x9}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x1000}}, @NFCTH_TUPLE={0x60, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x44810}, 0x14008048) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ppoll(&(0x7f00000003c0)=[{0xffffffffffffffff, 0x4008}, {r1, 0x1004}, {r3, 0xc620}, {r1, 0x8000}, {r0, 0x200}, {r4, 0x104}], 0x6, &(0x7f0000000400)={0x0, 0x3938700}, &(0x7f0000000440)={[0x3]}, 0x8) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000380)) ioctl$TIOCL_PASTESEL(r5, 0x541c, &(0x7f0000000000)) ioctl$GIO_SCRNMAP(r5, 0x4b30, &(0x7f0000000100)=""/103) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r6, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) socket$nl_generic(0x10, 0x3, 0x10) 13:26:37 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB, @ANYRESHEX]) [ 1485.859548] hfs: invalid gid -1 13:26:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) [ 1485.883456] hfs: unable to parse mount options 13:26:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r2, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x14c, 0x0, 0x9, 0x101, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x9}}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0xf346}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x6}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x9}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x1000}}, @NFCTH_TUPLE={0x60, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x44810}, 0x14008048) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ppoll(&(0x7f00000003c0)=[{0xffffffffffffffff, 0x4008}, {r1, 0x1004}, {r3, 0xc620}, {r1, 0x8000}, {r0, 0x200}, {r4, 0x104}], 0x6, &(0x7f0000000400)={0x0, 0x3938700}, &(0x7f0000000440)={[0x3]}, 0x8) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000380)) ioctl$TIOCL_PASTESEL(r5, 0x541c, &(0x7f0000000000)) ioctl$GIO_SCRNMAP(r5, 0x4b30, &(0x7f0000000100)=""/103) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r6, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) socket$nl_generic(0x10, 0x3, 0x10) 13:26:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>']) 13:26:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) [ 1486.028484] hfs: unable to parse mount options 13:26:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r2, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x14c, 0x0, 0x9, 0x101, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x9}}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0xf346}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x6}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x9}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x1000}}, @NFCTH_TUPLE={0x60, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x44810}, 0x14008048) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ppoll(&(0x7f00000003c0)=[{0xffffffffffffffff, 0x4008}, {r1, 0x1004}, {r3, 0xc620}, {r1, 0x8000}, {r0, 0x200}, {r4, 0x104}], 0x6, &(0x7f0000000400)={0x0, 0x3938700}, &(0x7f0000000440)={[0x3]}, 0x8) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000380)) ioctl$TIOCL_PASTESEL(r5, 0x541c, &(0x7f0000000000)) ioctl$GIO_SCRNMAP(r5, 0x4b30, &(0x7f0000000100)=""/103) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r6, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', 0x0, 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:37 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB, @ANYRESHEX]) 13:26:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) 13:26:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r2, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x14c, 0x0, 0x9, 0x101, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x9}}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0xf346}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x6}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x9}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x1000}}, @NFCTH_TUPLE={0x60, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x44810}, 0x14008048) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ppoll(&(0x7f00000003c0)=[{0xffffffffffffffff, 0x4008}, {r1, 0x1004}, {r3, 0xc620}, {r1, 0x8000}, {r0, 0x200}, {r4, 0x104}], 0x6, &(0x7f0000000400)={0x0, 0x3938700}, &(0x7f0000000440)={[0x3]}, 0x8) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000380)) ioctl$TIOCL_PASTESEL(r5, 0x541c, &(0x7f0000000000)) ioctl$GIO_SCRNMAP(r5, 0x4b30, &(0x7f0000000100)=""/103) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) [ 1486.221683] hfs: invalid gid -1 [ 1486.234389] hfs: unable to parse mount options 13:26:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) 13:26:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX]) 13:26:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r2, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x14c, 0x0, 0x9, 0x101, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x9}}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0xf346}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x6}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x9}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x1000}}, @NFCTH_TUPLE={0x60, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x44810}, 0x14008048) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ppoll(&(0x7f00000003c0)=[{0xffffffffffffffff, 0x4008}, {r1, 0x1004}, {r3, 0xc620}, {r1, 0x8000}, {r0, 0x200}, {r4, 0x104}], 0x6, &(0x7f0000000400)={0x0, 0x3938700}, &(0x7f0000000440)={[0x3]}, 0x8) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000380)) ioctl$TIOCL_PASTESEL(r5, 0x541c, &(0x7f0000000000)) ioctl$GIO_SCRNMAP(r5, 0x4b30, &(0x7f0000000100)=""/103) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:38 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) [ 1486.446279] hfs: unable to parse mount options 13:26:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', 0x0, 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r2, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x14c, 0x0, 0x9, 0x101, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x9}}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0xf346}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x6}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x9}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x1000}}, @NFCTH_TUPLE={0x60, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x44810}, 0x14008048) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ppoll(&(0x7f00000003c0)=[{0xffffffffffffffff, 0x4008}, {r1, 0x1004}, {r3, 0xc620}, {r1, 0x8000}, {r0, 0x200}, {r4, 0x104}], 0x6, &(0x7f0000000400)={0x0, 0x3938700}, &(0x7f0000000440)={[0x3]}, 0x8) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000380)) ioctl$TIOCL_PASTESEL(r5, 0x541c, &(0x7f0000000000)) ioctl$GIO_SCRNMAP(r5, 0x4b30, &(0x7f0000000100)=""/103) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:38 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB, @ANYRESHEX]) 13:26:38 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) [ 1486.567700] hfs: invalid gid -1 [ 1486.571036] hfs: unable to parse mount options 13:26:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r2, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x14c, 0x0, 0x9, 0x101, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x9}}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0xf346}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x6}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x9}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x1000}}, @NFCTH_TUPLE={0x60, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x44810}, 0x14008048) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ppoll(&(0x7f00000003c0)=[{0xffffffffffffffff, 0x4008}, {r1, 0x1004}, {r3, 0xc620}, {r1, 0x8000}, {r0, 0x200}, {r4, 0x104}], 0x6, &(0x7f0000000400)={0x0, 0x3938700}, &(0x7f0000000440)={[0x3]}, 0x8) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000380)) ioctl$TIOCL_PASTESEL(r5, 0x541c, &(0x7f0000000000)) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r6, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=']) 13:26:38 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) [ 1486.750478] hfs: unable to parse mount options 13:26:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r2, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x14c, 0x0, 0x9, 0x101, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x9}}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0xf346}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x6}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x9}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x1000}}, @NFCTH_TUPLE={0x60, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x44810}, 0x14008048) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ppoll(&(0x7f00000003c0)=[{0xffffffffffffffff, 0x4008}, {r1, 0x1004}, {r3, 0xc620}, {r1, 0x8000}, {r0, 0x200}, {r4, 0x104}], 0x6, &(0x7f0000000400)={0x0, 0x3938700}, &(0x7f0000000440)={[0x3]}, 0x8) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000380)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r5, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:38 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) 13:26:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', 0x0, 0x4, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:38 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000', @ANYRESHEX]) 13:26:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=']) 13:26:38 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) 13:26:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r2, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x14c, 0x0, 0x9, 0x101, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x9}}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0xf346}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x6}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x9}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x1000}}, @NFCTH_TUPLE={0x60, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x44810}, 0x14008048) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ppoll(&(0x7f00000003c0)=[{0xffffffffffffffff, 0x4008}, {r1, 0x1004}, {r3, 0xc620}, {r1, 0x8000}, {r0, 0x200}, {r4, 0x104}], 0x6, &(0x7f0000000400)={0x0, 0x3938700}, &(0x7f0000000440)={[0x3]}, 0x8) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r5, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:38 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) 13:26:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r2, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x14c, 0x0, 0x9, 0x101, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x9}}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0xf346}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x6}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x9}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x1000}}, @NFCTH_TUPLE={0x60, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x44810}, 0x14008048) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ppoll(&(0x7f00000003c0)=[{0xffffffffffffffff, 0x4008}, {r1, 0x1004}, {r3, 0xc620}, {r1, 0x8000}, {r0, 0x200}, {r4, 0x104}], 0x6, &(0x7f0000000400)={0x0, 0x3938700}, &(0x7f0000000440)={[0x3]}, 0x8) syz_open_dev$tty1(0xc, 0x4, 0x1) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r5, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) [ 1487.182647] hfs: unable to parse mount options 13:26:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r2, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x14c, 0x0, 0x9, 0x101, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x9}}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0xf346}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x6}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x9}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x1000}}, @NFCTH_TUPLE={0x60, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x44810}, 0x14008048) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ppoll(&(0x7f00000003c0)=[{0xffffffffffffffff, 0x4008}, {r1, 0x1004}, {r3, 0xc620}, {r1, 0x8000}, {r0, 0x200}, {r4, 0x104}], 0x6, &(0x7f0000000400)={0x0, 0x3938700}, &(0x7f0000000440)={[0x3]}, 0x8) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r5, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) [ 1487.290610] hfs: unable to parse mount options 13:26:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x7, &(0x7f0000000680)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="4ad3e6a9163dacb51421b22654bde3957962f9896324cbdf9ac5b3d677692ca339e121be2d898fe02453df2289d1806577b9681fc29e0e0db81e3a77121ee01d005125af8126a78fac3e2aa9b2c9814cc3f769062c0dd098ea158a01feb33cb1fc0abd1c753bb9944882111097e1b79f601f55b5ea977577f2de57aba1a16839bf42d87277ff7119dea4e6482b7f332f7bc5004bf8f9c16f422b32b035d0be9fa400fc7d48a937414ca8c24d55854a5a7e48be66d3510defa9f3f188e7903a5804bc75819fa13f39f67973727b31f90d4db0", 0xd2, 0x1ff}, {&(0x7f0000000280)="84fc7a378096e3e5f68060d0b779cea21acbbac89b175fbb3d005ffd482e8fa921e2071989d146be427a656b1d8dc2de1e26ac8362f98f47d0628c6a3a4137ea2033ba19c9480db9e8b5e408589333a7a06c39aa091457aec3df5ad689e7d3c01dd443093fbef73cea0458678f9bb4421d42ad4ee19050c2ee5680ccd3859766f745b1f451d4f8c12f87155393144a4589cd32ecc443fc8fcebd11cb4326700580a870a34673c257ecf171cb914672ee04f1f11e93fb39d088d2cfd8f9b0e55e0d100f4a2e73910c5809321cfaad498d67ef1d77b24544b337f0cccd8e4a81552ee46dce03904c091f55", 0xea, 0x5}, {&(0x7f0000000380)="e9b21ad122402245c5d26bd2dd5c03ab64a38b96ab67725f2a113a1e4317172d31604ae0b5fd765132962f792ab7ad2ed46f7cb203ae50b2c0cdc5df127d30a16dce4fb537a5ab4fd69a34d6796825746ca51448c3cd5cb93f56bb6a9c02f11de70a10c76c6b43b2e32c115e5f961352939cd46568c3da8ead0b1f2ee73e9fa80d448a3981d9fda049d68f8cf4f3e962b4", 0x91, 0x734a}, {&(0x7f0000000440)="f437bebab528466db4ce81245352f5ee59c821bdf3fad626a664babc584cf2ef9706938f5128d51affdce21a8b007f84af81ea0122d10f1fe521e852af795f8438db8f10d7915b0d25dd983966daca0710384b8c1a2bcf74bd02612872aa6016115b92ec0f9b0d2e22e502f3b7cae98e4ed76d293351ebd914fab39a4437eb4a76c3a52e2b97d2075babb36a58ec807c4975c84dfef000efe1b27bbffb6ad87c21ec0403b31ec9fbfbc1142404cdbd6ed203061732a7265372ad264bf016d42a50eddaa0a666b261f9ff650da6d7a604af8786ed971f8aa7aa5162c313b3e48b2c", 0xe1, 0xffff}, {&(0x7f0000000540)="01dbedab544ebe905f82af27ce5c803f1b7805b4f31c4ed311100e37ad7928fc485b64", 0x23, 0x7fffffff}, {&(0x7f0000000580)="f28f7b6db737095caa892100688df69e03eb7d55289a162ed5dac2572468d35a6894123cc6e672f38f1a38f29f2cae70b3a06fa70f3fd27b4de41c9ed3d4c1cbe33005e60c1f4fb96edf5156c219bf06f012704cd11e3a3eee878717db3b5db3e281f179d2f364835c30003ddc5f1a52e5e713e583856a1d309c30d4d1b53d75c546986803bc9d75e62ec6d7dcb76a75a2453394e96c8bc9f922fe761be87181215a4804e06a96a03d3e305a95efca4c79499494f2ec1e5be8b18753983f4432fd5dc96b5e8f1ee1f5e91cc7b5b84e", 0xcf, 0x2}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:39 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000', @ANYRESHEX]) 13:26:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[]) 13:26:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) 13:26:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r2, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x14c, 0x0, 0x9, 0x101, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x9}}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0xf346}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x6}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x9}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x1000}}, @NFCTH_TUPLE={0x60, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x44810}, 0x14008048) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r5, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) 13:26:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r2, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x14c, 0x0, 0x9, 0x101, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x9}}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0xf346}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x6}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x9}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x1000}}, @NFCTH_TUPLE={0x60, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x44810}, 0x14008048) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) socket$inet_tcp(0x2, 0x1, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r4, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) [ 1487.662054] hfs: unable to parse mount options [ 1487.662285] hfs: invalid gid -1 [ 1487.671987] hfs: unable to parse mount options 13:26:39 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000', @ANYRESHEX]) [ 1487.711446] hfs: can't find a HFS filesystem on dev loop1 13:26:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r2, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x14c, 0x0, 0x9, 0x101, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x9}}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0xf346}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x6}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x9}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x1000}}, @NFCTH_TUPLE={0x60, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x44810}, 0x14008048) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r4, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) 13:26:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[]) 13:26:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) 13:26:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r2, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x14c, 0x0, 0x9, 0x101, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x9}}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0xf346}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x6}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x9}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x1000}}, @NFCTH_TUPLE={0x60, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x44810}, 0x14008048) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet_tcp(0x2, 0x1, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r2, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x14c, 0x0, 0x9, 0x101, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x9}}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0xf346}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x6}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x9}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x1000}}, @NFCTH_TUPLE={0x60, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x44810}, 0x14008048) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) [ 1488.024359] hfs: unable to parse mount options 13:26:39 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,qu', @ANYRESHEX]) [ 1488.070905] hfs: invalid gid -1 [ 1488.090160] hfs: unable to parse mount options 13:26:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[]) 13:26:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) 13:26:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC, @ANYBLOB]) 13:26:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r1, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x14c, 0x0, 0x9, 0x101, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x9}}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0xf346}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x6}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x9}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x1000}}, @NFCTH_TUPLE={0x60, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x44810}, 0x14008048) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) 13:26:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r1, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x14c, 0x0, 0x9, 0x101, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x9}}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0xf346}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x6}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x9}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x1000}}, @NFCTH_TUPLE={0x60, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x44810}, 0x14008048) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r1, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x14c, 0x0, 0x9, 0x101, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x9}}, @NFCTH_TUPLE={0x94, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0xf346}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x6}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x9}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x1000}}, @NFCTH_TUPLE={0x60, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x44810}, 0x14008048) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) [ 1488.423310] hfs: can't find a HFS filesystem on dev loop1 [ 1488.479992] hfs: unable to parse mount options [ 1488.482734] hfs: invalid gid -1 [ 1488.490952] hfs: unable to parse mount options 13:26:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000080), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b30, &(0x7f0000000100)=""/103) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x7, 0x600000) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000180)={0x3f, 0x0, 0x0, 0x80}) ioctl$DRM_IOCTL_AGP_UNBIND(r3, 0x40106437, &(0x7f00000001c0)={r4, 0xcb}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$RTC_PLL_SET(r5, 0x40207012, &(0x7f0000000240)={0x1ff, 0x3, 0x3, 0x2, 0x3, 0x8, 0x9}) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1, 0x500) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000040)=""/35) 13:26:40 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,qu', @ANYRESHEX]) 13:26:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:26:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB]) 13:26:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x40840, 0x0) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) 13:26:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) ioctl$VHOST_GET_VRING_BASE(r3, 0xc008af12, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r4, 0x4b30, &(0x7f0000000100)=""/103) 13:26:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, 0x0, 0x40840, 0x0) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) 13:26:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) [ 1488.706625] hfs: unable to parse mount options 13:26:40 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,qu', @ANYRESHEX]) [ 1488.817620] hfs: can't find a HFS filesystem on dev loop3 13:26:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, 0x0, 0x40840, 0x0) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) 13:26:40 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB]) 13:26:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1489.035586] hfs: unable to parse mount options 13:26:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, 0x0, 0x40840, 0x0) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) 13:26:40 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB]) 13:26:40 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,', @ANYRESHEX]) [ 1489.167125] hfs: can't find a HFS filesystem on dev loop3 13:26:40 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:26:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) 13:26:41 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) [ 1489.406883] hfs: can't find a HFS filesystem on dev loop1 [ 1489.429799] hfs: unable to parse mount options 13:26:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) 13:26:41 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>', @ANYRESDEC]) 13:26:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000']) 13:26:41 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,', @ANYRESHEX]) 13:26:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000280)={0x7ff, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) 13:26:41 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x402c542d, 0x0) 13:26:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r3, 0x0) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180)='NLBL_UNLBL\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ioctl$EXT4_IOC_GROUP_EXTEND(r6, 0x40086607, &(0x7f0000000240)) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x7) r7 = fcntl$dupfd(r5, 0x0, r5) sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80020}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYRES64=r7, @ANYRES16=r4], 0xd0}, 0x1, 0x0, 0x0, 0x8090}, 0x44) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x7c, r4, 0x4, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast2}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'batadv0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @rand_addr=0x64010102}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast2}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}]}, 0x7c}, 0x1, 0x0, 0x0, 0x800}, 0x880) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) 13:26:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) [ 1489.836290] hfs: unable to parse mount options 13:26:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000']) [ 1489.896100] hfs: invalid gid -1 [ 1489.899426] hfs: unable to parse mount options 13:26:41 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,', @ANYRESHEX]) 13:26:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x402c542d, 0x0) 13:26:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX, @ANYBLOB=',dir_umask=00000000000000000000401,codepage=iso8859-2,context=staff_u,fowner>']) 13:26:41 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r0, 0x4b30, &(0x7f0000000000)=""/104) 13:26:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x402c542d, 0x0) 13:26:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000240)='./file0/bus\x00', 0x4003, 0x0) sendfile(r2, r3, 0x0, 0x0) ioctl$USBDEVFS_GETDRIVER(r3, 0x41045508, &(0x7f0000000180)={0xffff7437, "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"}) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r4, 0x4b30, &(0x7f0000000100)=""/103) r5 = socket$inet6(0xa, 0x3, 0x3a) r6 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x0) ioctl$FIONREAD(r6, 0x541b, &(0x7f0000000000)) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x4a}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r9, @ANYBLOB="0000400000000002280012000c00010096657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="300000001400210100000000000000000201a000", @ANYRES32=r9, @ANYBLOB="dfe20008003673bf3fec4c0e9eb784357a32ffffff080008"], 0x30}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000040)={r9, 0x1, 0x6, @broadcast}, 0x10) 13:26:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000280)={0x0, 0x6, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) [ 1490.230166] hfs: unable to parse mount options [ 1490.230328] hfs: can't find a HFS filesystem on dev loop1 [ 1490.278783] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 13:26:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) [ 1490.325898] hfs: invalid gid -1 [ 1490.339583] hfs: unable to parse mount options [ 1490.357653] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 13:26:42 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gi', @ANYRESHEX]) 13:26:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB]) 13:26:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX]) 13:26:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x8000) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x3, 0x3a) r2 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) r3 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r3, 0x0) r4 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r4, 0x0) write$P9_RXATTRCREATE(r4, &(0x7f0000000000)={0x4e, 0x21, 0x1}, 0x7) sendfile(r1, r2, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) 13:26:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000280)={0x0, 0x0, 0x5, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) 13:26:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1446, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) 13:26:42 executing program 5: clock_settime(0x5, &(0x7f0000000040)={0x0, 0x3938700}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000000)=0x42, 0x4) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = socket$inet6(0xa, 0x3, 0x3a) r4 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) getsockopt$CAN_RAW_RECV_OWN_MSGS(r4, 0x65, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 13:26:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) [ 1490.626326] hfs: invalid gid -1 [ 1490.630045] hfs: unable to parse mount options 13:26:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xe1, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) 13:26:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=']) 13:26:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) [ 1490.741081] hfs: unable to parse mount options [ 1490.746635] hfs: can't find a HFS filesystem on dev loop1 13:26:42 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gi', @ANYRESHEX]) 13:26:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB]) 13:26:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000280)={0xffffffffffffffff}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) ptrace$pokeuser(0x6, r3, 0x9246, 0x0) capget(&(0x7f0000000000)={0x20080522, r3}, &(0x7f0000000040)={0x1, 0xfe0d15b, 0x8cec, 0x6, 0x8, 0x1}) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r4, 0x4b30, &(0x7f0000000100)=""/103) 13:26:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x1, 0x7ff}) 13:26:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r3, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x22, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) 13:26:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb", 0x0, 0x7ff}) 13:26:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$sock_timeval(r2, 0x1, 0x42, &(0x7f0000000180)={0x0, 0xea60}, 0x10) recvfrom$inet6(r2, &(0x7f0000000280)=""/156, 0x9c, 0x1, &(0x7f00000001c0)={0xa, 0x4e24, 0x75dd, @dev={0xfe, 0x80, [], 0x30}, 0xff}, 0x1c) r3 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000080)={0x3f, 0x7, 0x1, 0xe55}, 0x10) r4 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r4, 0x0) connect$nfc_raw(r4, &(0x7f0000000000)={0x27, 0x1, 0x0, 0x4}, 0xfffffffffffffdca) r5 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$GIO_SCRNMAP(r5, 0x4b30, &(0x7f0000000100)=""/103) r6 = socket$inet6(0xa, 0x3, 0x3a) r7 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$bt_sco(0xffffffffffffffff, &(0x7f0000000200)={0x1f, @fixed={[], 0x10}}, 0x8) sendfile(r6, r7, 0x0, 0x0) getpeername$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000000c0)=0x1c) [ 1491.103564] hfs: unable to parse mount options [ 1491.116810] hfs: unable to parse mount options [ 1491.158815] hfs: can't find a HFS filesystem on dev loop1 13:26:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=']) 13:26:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB]) 13:26:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r4 = fcntl$dupfd(r1, 0x406, r3) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x4a}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r9, @ANYBLOB="0000400000000002280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="300000001400210300000000000000000201a000", @ANYRES32=r9, @ANYBLOB="08000200e000000208000400ffffffff0800080000040000"], 0x30}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) sendmsg$NL80211_CMD_GET_INTERFACE(r4, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r5, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r9}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x6, 0x2}}]}, 0x30}, 0x1, 0x0, 0x0, 0x24000001}, 0x4000040) 13:26:42 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gi', @ANYRESHEX]) 13:26:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:43 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0xf402000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x1d8, 0x190, 0x190, 0x1d8, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd8, 0x100, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x1, 0x9], 0x1}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x4, 0x6, 0x800, 0x1f, 'snmp_trap\x00', 'syz1\x00', {0x5}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r1, 0x4b30, &(0x7f0000000100)=""/103) [ 1491.378954] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 13:26:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x00']) [ 1491.505159] hfs: unable to parse mount options 13:26:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) [ 1491.548694] hfs: unable to parse mount options 13:26:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=']) 13:26:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:43 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid', @ANYRESHEX]) 13:26:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b30, &(0x7f0000000100)=""/103) 13:26:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x1) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f0000000040)=0x80) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) sendmmsg$sock(r3, &(0x7f0000000380)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="32b9e55a0b82ee32c9ea2dba85c04b347ea1d5cccb543d3a478de565be106b7f983534d804bfe1b7d1680fce541fb787ab192a7bce64594d30eec21c0eb086b6bf5f6867f00d28edee3dc8d5df84b4b77eb85067744aed9a3183fe0d8315291d91f12068cac80dd44fcafbdcb0757c87", 0x70}], 0x1}}, {{&(0x7f00000001c0)=@tipc=@name={0x1e, 0x2, 0x2, {{0x2, 0x1}, 0x1}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000240)="91bd8c3e89a528902efcc30f3b276ea922989fd5e37a984ac754a61d8cd4fb248cc5d567772cecc0d096e73f8550370a3ce38975bf8d438a5b94a7549dfd23cae110918dff049cfc6a88e036f0fc738fe091a8a5bcfab429436e27cba95f06f281e4ce1aa0fa0738df911f3a40153f004e2cab9ac586ffdbc2bf1a554c7119d0efff9699d96fe584e579492dc2105288f2ac7315b0b99e06", 0x98}], 0x1, &(0x7f0000000340)=[@mark={{0x14, 0x1, 0x24, 0x101}}], 0x18}}], 0x2, 0x4000004) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r4, 0x4b30, &(0x7f0000000100)=""/103) [ 1491.737737] hfs: can't find a HFS filesystem on dev loop1 13:26:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='p']) 13:26:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x1) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f0000000040)=0x80) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) sendmmsg$sock(r3, &(0x7f0000000380)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="32b9e55a0b82ee32c9ea2dba85c04b347ea1d5cccb543d3a478de565be106b7f983534d804bfe1b7d1680fce541fb787ab192a7bce64594d30eec21c0eb086b6bf5f6867f00d28edee3dc8d5df84b4b77eb85067744aed9a3183fe0d8315291d91f12068cac80dd44fcafbdcb0757c87", 0x70}], 0x1}}, {{&(0x7f00000001c0)=@tipc=@name={0x1e, 0x2, 0x2, {{0x2, 0x1}, 0x1}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000240)="91bd8c3e89a528902efcc30f3b276ea922989fd5e37a984ac754a61d8cd4fb248cc5d567772cecc0d096e73f8550370a3ce38975bf8d438a5b94a7549dfd23cae110918dff049cfc6a88e036f0fc738fe091a8a5bcfab429436e27cba95f06f281e4ce1aa0fa0738df911f3a40153f004e2cab9ac586ffdbc2bf1a554c7119d0efff9699d96fe584e579492dc2105288f2ac7315b0b99e06", 0x98}], 0x1, &(0x7f0000000340)=[@mark={{0x14, 0x1, 0x24, 0x101}}], 0x18}}], 0x2, 0x4000004) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r4, 0x4b30, &(0x7f0000000100)=""/103) 13:26:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) [ 1491.873432] hfs: unable to parse mount options [ 1491.890512] hfs: unable to parse mount options 13:26:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYRESHEX]) 13:26:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:43 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid', @ANYRESHEX]) 13:26:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r3, 0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000000)) ioctl$GIO_SCRNMAP(r2, 0x4b44, &(0x7f0000000100)=""/103) 13:26:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='p']) 13:26:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r3 = socket(0x2000000000000021, 0x0, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24}}, 0x24) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r3, 0x8983, &(0x7f0000000000)={0x8, 'erspan0\x00', {'veth0_to_bond\x00'}, 0xed}) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x46) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0xfffa, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB="02004200", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b005) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$tty1(0xc, 0x4, 0x1) 13:26:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, &(0x7f0000000080)) 13:26:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r1, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) [ 1492.170146] hfs: unable to parse mount options 13:26:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r1, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) 13:26:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYRESHEX]) 13:26:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b68, &(0x7f0000000100)=""/103) 13:26:44 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid', @ANYRESHEX]) 13:26:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r1, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) [ 1492.356615] hfs: unable to parse mount options 13:26:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r1, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x540f, &(0x7f0000000100)=""/103) 13:26:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='p']) 13:26:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x540f, &(0x7f0000000100)=""/103) 13:26:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b68, &(0x7f0000000100)=""/103) 13:26:44 executing program 4 (fault-call:4 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) 13:26:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r2, 0x540f, &(0x7f0000000100)=""/103) 13:26:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYRESHEX]) 13:26:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) [ 1492.606749] hfs: unable to parse mount options 13:26:44 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) [ 1492.713032] hfs: unable to parse mount options 13:26:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) 13:26:44 executing program 0 (fault-call:1 fault-nth:0): syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX]) 13:26:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=']) 13:26:44 executing program 5 (fault-call:4 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x6, 0xc, 0x0, 0x0) 13:26:44 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) [ 1492.880787] hfs: unable to parse mount options 13:26:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:44 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) [ 1492.918785] FAULT_INJECTION: forcing a failure. [ 1492.918785] name failslab, interval 1, probability 0, space 0, times 0 13:26:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000080)={0x34, r4, 0x1, 0x0, 0x0, {0x7}, [@L2TP_ATTR_IFNAME={0x14}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x2}]}, 0x34}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r4, 0x400, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x44000}, 0x10) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_STARTDAEMON(r5, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'tunl0\x00', 0x3}, 0x18) [ 1492.978384] CPU: 0 PID: 23781 Comm: syz-executor.0 Not tainted 4.19.130-syzkaller #0 [ 1492.986314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1492.995685] Call Trace: [ 1492.998301] dump_stack+0x1fc/0x2fe [ 1493.001960] should_fail.cold+0xa/0x14 [ 1493.005871] ? setup_fault_attr+0x200/0x200 [ 1493.010211] ? lock_acquire+0x170/0x3c0 [ 1493.014208] __should_failslab+0x115/0x180 [ 1493.018461] should_failslab+0x5/0xf [ 1493.022195] __kmalloc+0x2ab/0x3c0 [ 1493.025748] ? __se_sys_memfd_create+0xf8/0x440 [ 1493.030431] __se_sys_memfd_create+0xf8/0x440 [ 1493.034940] ? memfd_file_seals_ptr+0x150/0x150 [ 1493.039619] ? posix_timer_fn+0x3d0/0x3d0 [ 1493.043775] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1493.048544] ? trace_hardirqs_off_caller+0x69/0x210 [ 1493.053571] ? do_syscall_64+0x21/0x620 [ 1493.057555] do_syscall_64+0xf9/0x620 [ 1493.061369] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1493.066561] RIP: 0033:0x45cb19 [ 1493.069760] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1493.088673] RSP: 002b:00007f23d9459a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1493.096398] RAX: ffffffffffffffda RBX: 000000000050a0c0 RCX: 000000000045cb19 [ 1493.103683] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1c71 [ 1493.110965] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000001 [ 1493.118248] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1493.125528] R13: 0000000000000c2b R14: 00000000004ce79f R15: 00007f23d945a6d4 13:26:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB, @ANYRESHEX]) 13:26:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x2, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=']) 13:26:44 executing program 0 (fault-call:1 fault-nth:1): syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX]) 13:26:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = socket(0xa, 0x1, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) creat(&(0x7f0000000140)='./file0\x00', 0x8d) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r3, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB="200000ede3000000840000000200"/28, @ANYRES32=r5], 0x20}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000080)={r5, @in6={{0xa, 0x4e23, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x100}}}, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000080)={r5, 0x2}, 0x8) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, 0x0, 0x0) [ 1493.250879] audit: type=1800 audit(1593178004.887:135): pid=23797 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=15810 res=0 13:26:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x4b47, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) [ 1493.409003] FAULT_INJECTION: forcing a failure. [ 1493.409003] name failslab, interval 1, probability 0, space 0, times 0 [ 1493.436340] CPU: 0 PID: 23806 Comm: syz-executor.0 Not tainted 4.19.130-syzkaller #0 [ 1493.444263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1493.453626] Call Trace: 13:26:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x4b49, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) [ 1493.456241] dump_stack+0x1fc/0x2fe [ 1493.459891] should_fail.cold+0xa/0x14 [ 1493.463800] ? setup_fault_attr+0x200/0x200 [ 1493.468135] ? lock_acquire+0x170/0x3c0 [ 1493.472131] __should_failslab+0x115/0x180 [ 1493.476384] should_failslab+0x5/0xf [ 1493.480103] kmem_cache_alloc+0x277/0x370 [ 1493.484241] ? shmem_destroy_callback+0xb0/0xb0 [ 1493.488911] shmem_alloc_inode+0x18/0x40 [ 1493.492989] ? shmem_destroy_callback+0xb0/0xb0 [ 1493.497667] alloc_inode+0x5d/0x180 [ 1493.501292] new_inode+0x1d/0xf0 [ 1493.504658] shmem_get_inode+0x96/0x8d0 [ 1493.508645] __shmem_file_setup.part.0+0x7a/0x2b0 [ 1493.513499] shmem_file_setup+0x61/0x90 [ 1493.517481] __se_sys_memfd_create+0x26b/0x440 [ 1493.522063] ? memfd_file_seals_ptr+0x150/0x150 [ 1493.526722] ? posix_timer_fn+0x3d0/0x3d0 [ 1493.530867] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1493.535625] ? trace_hardirqs_off_caller+0x69/0x210 [ 1493.540644] ? do_syscall_64+0x21/0x620 [ 1493.544617] do_syscall_64+0xf9/0x620 [ 1493.548422] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1493.553603] RIP: 0033:0x45cb19 [ 1493.556792] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1493.576226] RSP: 002b:00007f23d947aa68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1493.583940] RAX: ffffffffffffffda RBX: 000000000050a0c0 RCX: 000000000045cb19 [ 1493.591206] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1c71 [ 1493.598476] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000001 13:26:45 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:45 executing program 0 (fault-call:1 fault-nth:2): syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX]) [ 1493.605752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1493.613027] R13: 0000000000000c2b R14: 00000000004ce79f R15: 00007f23d947b6d4 13:26:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5401, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5402, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) [ 1493.694253] hfs: unable to parse mount options [ 1493.699387] hfs: unable to parse mount options 13:26:45 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB, @ANYRESHEX]) 13:26:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=']) [ 1493.812562] FAULT_INJECTION: forcing a failure. [ 1493.812562] name failslab, interval 1, probability 0, space 0, times 0 13:26:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) [ 1493.858095] CPU: 0 PID: 23853 Comm: syz-executor.0 Not tainted 4.19.130-syzkaller #0 [ 1493.866026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1493.875391] Call Trace: [ 1493.878000] dump_stack+0x1fc/0x2fe [ 1493.881652] should_fail.cold+0xa/0x14 [ 1493.885563] ? setup_fault_attr+0x200/0x200 [ 1493.889895] ? get_pid_task+0xf4/0x190 [ 1493.893798] __should_failslab+0x115/0x180 [ 1493.898048] should_failslab+0x5/0xf [ 1493.901773] kmem_cache_alloc+0x277/0x370 [ 1493.905936] selinux_inode_alloc_security+0xb1/0x2a0 [ 1493.911052] security_inode_alloc+0x67/0xc0 [ 1493.915390] inode_init_always+0x5a3/0xb70 [ 1493.919642] alloc_inode+0x7a/0x180 [ 1493.923278] new_inode+0x1d/0xf0 [ 1493.926661] shmem_get_inode+0x96/0x8d0 [ 1493.930654] __shmem_file_setup.part.0+0x7a/0x2b0 [ 1493.935514] shmem_file_setup+0x61/0x90 [ 1493.939499] __se_sys_memfd_create+0x26b/0x440 [ 1493.944095] ? memfd_file_seals_ptr+0x150/0x150 [ 1493.948773] ? posix_timer_fn+0x3d0/0x3d0 [ 1493.952931] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1493.957700] ? trace_hardirqs_off_caller+0x69/0x210 [ 1493.962725] ? do_syscall_64+0x21/0x620 [ 1493.966712] do_syscall_64+0xf9/0x620 [ 1493.970527] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1493.975720] RIP: 0033:0x45cb19 [ 1493.978914] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1493.997822] RSP: 002b:00007f23d9459a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 13:26:45 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) [ 1494.005540] RAX: ffffffffffffffda RBX: 000000000050a0c0 RCX: 000000000045cb19 [ 1494.012815] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1c71 [ 1494.020097] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000001 [ 1494.027374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1494.034654] R13: 0000000000000c2b R14: 00000000004ce79f R15: 00007f23d945a6d4 13:26:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) dup2(r1, r0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x80000000) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, 0x0, 0x0) 13:26:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5404, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB, @ANYRESHEX]) 13:26:45 executing program 0 (fault-call:1 fault-nth:3): syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX]) [ 1494.119082] hfs: unable to parse mount options 13:26:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x']) 13:26:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5405, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r3 = dup2(r0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r4, 0x112, 0xc, 0x0, 0x0) 13:26:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) [ 1494.291379] hfs: unable to parse mount options 13:26:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5406, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) [ 1494.312563] FAULT_INJECTION: forcing a failure. [ 1494.312563] name failslab, interval 1, probability 0, space 0, times 0 [ 1494.342190] CPU: 0 PID: 23920 Comm: syz-executor.0 Not tainted 4.19.130-syzkaller #0 [ 1494.350161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1494.359526] Call Trace: 13:26:46 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) ioctl$PPPIOCSPASS(r2, 0x40107447, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x5, 0x59, 0x0, 0x8}, {0x0, 0x5b, 0x8b, 0x7}]}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r5, 0x112, 0xc, 0x0, 0x0) r6 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$VIDIOC_EXPBUF(r6, 0xc0405610, &(0x7f0000000040)={0x1, 0x20, 0x9}) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, r7, 0x200, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x18, 0x17, {0xd, 0x7, @udp='udp:syz2\x00'}}}, ["", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x24000080}, 0x0) [ 1494.362146] dump_stack+0x1fc/0x2fe [ 1494.365798] should_fail.cold+0xa/0x14 [ 1494.369706] ? setup_fault_attr+0x200/0x200 [ 1494.374039] ? lock_acquire+0x170/0x3c0 [ 1494.378032] __should_failslab+0x115/0x180 [ 1494.382269] should_failslab+0x5/0xf [ 1494.385987] kmem_cache_alloc+0x277/0x370 [ 1494.390127] __d_alloc+0x2b/0xa10 [ 1494.393568] d_alloc_pseudo+0x19/0x70 [ 1494.397363] alloc_file_pseudo+0xc6/0x250 [ 1494.401499] ? check_preemption_disabled+0x41/0x280 [ 1494.406502] ? alloc_file+0x4d0/0x4d0 [ 1494.412117] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 1494.417741] ? shmem_get_inode+0x44c/0x8d0 [ 1494.421965] __shmem_file_setup.part.0+0x102/0x2b0 [ 1494.426885] shmem_file_setup+0x61/0x90 [ 1494.430848] __se_sys_memfd_create+0x26b/0x440 [ 1494.435421] ? memfd_file_seals_ptr+0x150/0x150 [ 1494.440084] ? posix_timer_fn+0x3d0/0x3d0 [ 1494.444224] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1494.448975] ? trace_hardirqs_off_caller+0x69/0x210 [ 1494.453979] ? do_syscall_64+0x21/0x620 [ 1494.457944] do_syscall_64+0xf9/0x620 [ 1494.461748] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1494.466981] RIP: 0033:0x45cb19 [ 1494.470168] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1494.489193] RSP: 002b:00007f23d9459a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1494.496896] RAX: ffffffffffffffda RBX: 000000000050a0c0 RCX: 000000000045cb19 [ 1494.504160] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1c71 13:26:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) [ 1494.511427] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000001 [ 1494.518686] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1494.525955] R13: 0000000000000c2b R14: 00000000004ce79f R15: 00007f23d945a6d4 [ 1494.586961] hfs: unable to parse mount options 13:26:46 executing program 0 (fault-call:1 fault-nth:4): syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX]) 13:26:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x']) 13:26:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000', @ANYRESHEX]) 13:26:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5407, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xa2fdfd, 0xa30002}, 0xffffffffffffffff}, 0x20, 0x0, 0x0) syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000000)={'veth1_vlan\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r5, 0x112, 0xc, 0x0, 0x0) [ 1494.786483] FAULT_INJECTION: forcing a failure. [ 1494.786483] name failslab, interval 1, probability 0, space 0, times 0 [ 1494.811803] CPU: 0 PID: 23940 Comm: syz-executor.0 Not tainted 4.19.130-syzkaller #0 [ 1494.819737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1494.829104] Call Trace: [ 1494.831718] dump_stack+0x1fc/0x2fe 13:26:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5408, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) [ 1494.835374] should_fail.cold+0xa/0x14 [ 1494.839305] ? setup_fault_attr+0x200/0x200 [ 1494.843648] ? lock_acquire+0x170/0x3c0 [ 1494.847641] __should_failslab+0x115/0x180 [ 1494.851889] should_failslab+0x5/0xf [ 1494.855616] kmem_cache_alloc+0x277/0x370 [ 1494.859791] __alloc_file+0x21/0x330 [ 1494.863514] alloc_empty_file+0x6d/0x170 [ 1494.867580] alloc_file+0x5e/0x4d0 [ 1494.871125] alloc_file_pseudo+0x165/0x250 [ 1494.875375] ? alloc_file+0x4d0/0x4d0 [ 1494.879184] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 1494.884831] ? shmem_get_inode+0x44c/0x8d0 [ 1494.889082] __shmem_file_setup.part.0+0x102/0x2b0 [ 1494.894039] shmem_file_setup+0x61/0x90 [ 1494.898023] __se_sys_memfd_create+0x26b/0x440 [ 1494.902614] ? memfd_file_seals_ptr+0x150/0x150 [ 1494.907286] ? posix_timer_fn+0x3d0/0x3d0 [ 1494.911432] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1494.916177] ? trace_hardirqs_off_caller+0x69/0x210 [ 1494.921178] ? do_syscall_64+0x21/0x620 [ 1494.925152] do_syscall_64+0xf9/0x620 [ 1494.928951] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1494.934125] RIP: 0033:0x45cb19 [ 1494.937304] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1494.956198] RSP: 002b:00007f23d947aa68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1494.963893] RAX: ffffffffffffffda RBX: 000000000050a0c0 RCX: 000000000045cb19 [ 1494.971152] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1c71 [ 1494.978408] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000001 13:26:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:46 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, 0x0, 0x0) 13:26:46 executing program 0 (fault-call:1 fault-nth:5): syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX]) [ 1494.985669] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1494.992930] R13: 0000000000000c2b R14: 00000000004ce79f R15: 00007f23d947b6d4 13:26:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) [ 1495.085571] hfs: unable to parse mount options 13:26:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000', @ANYRESHEX]) 13:26:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$isdn(0x22, 0x3, 0x4) fsync(r1) r2 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, 0x0, 0x0) 13:26:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x']) 13:26:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5409, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) [ 1495.208322] FAULT_INJECTION: forcing a failure. [ 1495.208322] name failslab, interval 1, probability 0, space 0, times 0 [ 1495.246605] CPU: 1 PID: 23998 Comm: syz-executor.0 Not tainted 4.19.130-syzkaller #0 [ 1495.254619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1495.263991] Call Trace: [ 1495.266592] dump_stack+0x1fc/0x2fe [ 1495.270237] should_fail.cold+0xa/0x14 [ 1495.274150] ? setup_fault_attr+0x200/0x200 [ 1495.278491] ? lock_acquire+0x170/0x3c0 [ 1495.282488] __should_failslab+0x115/0x180 [ 1495.286858] should_failslab+0x5/0xf [ 1495.290583] kmem_cache_alloc+0x277/0x370 [ 1495.294750] selinux_file_alloc_security+0xaf/0x190 [ 1495.299778] security_file_alloc+0x40/0x90 [ 1495.304025] __alloc_file+0xc9/0x330 13:26:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x540a, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) [ 1495.307753] alloc_empty_file+0x6d/0x170 [ 1495.311830] alloc_file+0x5e/0x4d0 [ 1495.315383] alloc_file_pseudo+0x165/0x250 [ 1495.319638] ? alloc_file+0x4d0/0x4d0 [ 1495.323463] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 1495.329098] ? shmem_get_inode+0x44c/0x8d0 [ 1495.333351] __shmem_file_setup.part.0+0x102/0x2b0 [ 1495.338288] shmem_file_setup+0x61/0x90 [ 1495.342257] __se_sys_memfd_create+0x26b/0x440 [ 1495.346827] ? memfd_file_seals_ptr+0x150/0x150 [ 1495.351482] ? posix_timer_fn+0x3d0/0x3d0 [ 1495.355617] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1495.360359] ? trace_hardirqs_off_caller+0x69/0x210 [ 1495.365362] ? do_syscall_64+0x21/0x620 [ 1495.369327] do_syscall_64+0xf9/0x620 [ 1495.373120] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1495.378296] RIP: 0033:0x45cb19 [ 1495.381479] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1495.400369] RSP: 002b:00007f23d9459a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 13:26:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) [ 1495.408065] RAX: ffffffffffffffda RBX: 000000000050a0c0 RCX: 000000000045cb19 [ 1495.415320] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1c71 [ 1495.422574] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000001 [ 1495.429827] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1495.437083] R13: 0000000000000c2b R14: 00000000004ce79f R15: 00007f23d945a6d4 13:26:47 executing program 0 (fault-call:1 fault-nth:6): syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX]) 13:26:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x540b, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400201) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000040)=0x3) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r4 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r4, 0x0) r5 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r5, 0x0) r6 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r6, 0x0) ioctl$VIDIOC_G_JPEGCOMP(r1, 0x808c563d, &(0x7f0000000140)) getsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, 0x0, 0x0) fchdir(r3) [ 1495.520673] hfs: unable to parse mount options 13:26:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0']) 13:26:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000', @ANYRESHEX]) 13:26:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x7, 0x7}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, 0x0, 0x0) 13:26:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x540c, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) [ 1495.657012] FAULT_INJECTION: forcing a failure. [ 1495.657012] name failslab, interval 1, probability 0, space 0, times 0 13:26:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) [ 1495.697970] CPU: 1 PID: 24032 Comm: syz-executor.0 Not tainted 4.19.130-syzkaller #0 [ 1495.705899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1495.715266] Call Trace: [ 1495.717892] dump_stack+0x1fc/0x2fe [ 1495.721548] should_fail.cold+0xa/0x14 [ 1495.725455] ? setup_fault_attr+0x200/0x200 [ 1495.729798] ? lock_acquire+0x170/0x3c0 [ 1495.733795] __should_failslab+0x115/0x180 [ 1495.738047] should_failslab+0x5/0xf [ 1495.741773] kmem_cache_alloc+0x277/0x370 13:26:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x540d, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) [ 1495.745935] getname_flags+0xce/0x590 [ 1495.749755] do_sys_open+0x26c/0x520 [ 1495.753483] ? filp_open+0x70/0x70 [ 1495.757027] ? check_preemption_disabled+0x41/0x280 [ 1495.762055] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1495.766825] ? trace_hardirqs_off_caller+0x69/0x210 [ 1495.771854] ? do_syscall_64+0x21/0x620 [ 1495.775848] do_syscall_64+0xf9/0x620 [ 1495.779756] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1495.784930] RIP: 0033:0x416911 [ 1495.788141] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1495.807044] RSP: 002b:00007f23d947aa60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1495.814743] RAX: ffffffffffffffda RBX: 000000000050a0c0 RCX: 0000000000416911 [ 1495.821998] RDX: 00007f23d947ab0a RSI: 0000000000000002 RDI: 00007f23d947ab00 [ 1495.829263] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1495.836536] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 13:26:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r3 = msgget$private(0x0, 0x0) msgsnd(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x2000, 0x0) msgctl$MSG_INFO(r3, 0xc, &(0x7f0000000000)=""/215) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) [ 1495.843793] R13: 0000000000000c2b R14: 00000000004ce79f R15: 00007f23d947b6d4 13:26:47 executing program 0 (fault-call:1 fault-nth:7): syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX]) 13:26:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x540e, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) [ 1495.922224] hfs: can't find a HFS filesystem on dev loop1 [ 1495.931876] hfs: unable to parse mount options 13:26:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f0000000000)=""/64, &(0x7f0000000040)=0x40) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) 13:26:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x']) 13:26:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,qu', @ANYRESHEX]) 13:26:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x540f, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) [ 1496.062278] FAULT_INJECTION: forcing a failure. [ 1496.062278] name failslab, interval 1, probability 0, space 0, times 0 [ 1496.095322] CPU: 0 PID: 24094 Comm: syz-executor.0 Not tainted 4.19.130-syzkaller #0 [ 1496.103246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1496.112614] Call Trace: [ 1496.115232] dump_stack+0x1fc/0x2fe [ 1496.118889] should_fail.cold+0xa/0x14 [ 1496.122797] ? setup_fault_attr+0x200/0x200 [ 1496.127131] ? lock_acquire+0x170/0x3c0 [ 1496.131128] __should_failslab+0x115/0x180 [ 1496.135380] should_failslab+0x5/0xf [ 1496.139105] kmem_cache_alloc+0x277/0x370 [ 1496.143270] __alloc_file+0x21/0x330 [ 1496.147000] alloc_empty_file+0x6d/0x170 [ 1496.151068] path_openat+0xe9/0x2df0 [ 1496.154793] ? __lock_acquire+0x6de/0x3ff0 [ 1496.159053] ? current_time+0x6f/0x1c0 13:26:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) [ 1496.162963] ? path_lookupat+0x8d0/0x8d0 [ 1496.167033] ? mark_held_locks+0xf0/0xf0 [ 1496.171100] ? mark_held_locks+0xf0/0xf0 [ 1496.175174] ? shmem_setattr+0x2d0/0xc90 [ 1496.179254] do_filp_open+0x18c/0x3f0 [ 1496.183073] ? may_open_dev+0xf0/0xf0 [ 1496.186886] ? __alloc_fd+0x28d/0x570 [ 1496.190705] ? lock_downgrade+0x720/0x720 [ 1496.194865] ? lock_acquire+0x170/0x3c0 [ 1496.198848] ? __alloc_fd+0x34/0x570 [ 1496.202568] ? do_raw_spin_unlock+0x171/0x230 [ 1496.207159] ? _raw_spin_unlock+0x29/0x40 [ 1496.211318] ? __alloc_fd+0x28d/0x570 [ 1496.215137] do_sys_open+0x3b3/0x520 [ 1496.218847] ? filp_open+0x70/0x70 [ 1496.222378] ? check_preemption_disabled+0x41/0x280 [ 1496.227400] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1496.232161] ? trace_hardirqs_off_caller+0x69/0x210 [ 1496.237185] ? do_syscall_64+0x21/0x620 [ 1496.241154] do_syscall_64+0xf9/0x620 [ 1496.244958] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1496.250145] RIP: 0033:0x416911 [ 1496.253323] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1496.272222] RSP: 002b:00007f23d9459a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1496.280092] RAX: ffffffffffffffda RBX: 000000000050a0c0 RCX: 0000000000416911 [ 1496.287372] RDX: 00007f23d9459b0a RSI: 0000000000000002 RDI: 00007f23d9459b00 [ 1496.294661] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 000000000000000a [ 1496.301943] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 13:26:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5410, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) [ 1496.309215] R13: 0000000000000c2b R14: 00000000004ce79f R15: 00007f23d945a6d4 13:26:48 executing program 0 (fault-call:1 fault-nth:8): syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX]) 13:26:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) ptrace$pokeuser(0x6, r2, 0x9246, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x4a}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="480000001014a4ed7687d364ea2e000507000000000000000000000002", @ANYRES32=r6, @ANYBLOB="0000400000000002280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@ipv4_newaddr={0x30, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0xa0, 0x0, r6}, [@IFA_LOCAL={0x8, 0x2, @multicast2}, @IFA_BROADCAST={0x8, 0x4, @broadcast}, @IFA_FLAGS={0x8, 0x8, 0x400}]}, 0x30}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000100)={@private2={0xfc, 0x2, [], 0x1}, @dev={0xfe, 0x80, [], 0x16}, @private0={0xfc, 0x0, [], 0x1}, 0x7d, 0x8, 0x3, 0x0, 0x8, 0xdf190d985a446092, r6}) r7 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f00000001c0)=0x100) fchmod(r7, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r2, r7, 0x0, 0x3, &(0x7f0000000000)='/*\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r9, 0x112, 0xc, 0x0, 0x0) 13:26:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) [ 1496.400396] hfs: unable to parse mount options 13:26:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5411, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:48 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r1 = socket$nl_crypto(0x10, 0x3, 0x15) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r3 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r4, 0x112, 0xc, 0x0, 0x0) [ 1496.432100] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5136 sclass=netlink_route_socket pid=24126 comm=syz-executor.4 [ 1496.451740] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5136 sclass=netlink_route_socket pid=24129 comm=syz-executor.4 13:26:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x']) 13:26:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,qu', @ANYRESHEX]) 13:26:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5412, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) [ 1496.587342] FAULT_INJECTION: forcing a failure. [ 1496.587342] name failslab, interval 1, probability 0, space 0, times 0 [ 1496.652797] CPU: 0 PID: 24137 Comm: syz-executor.0 Not tainted 4.19.130-syzkaller #0 [ 1496.660727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1496.670116] Call Trace: [ 1496.672733] dump_stack+0x1fc/0x2fe [ 1496.676399] should_fail.cold+0xa/0x14 [ 1496.680310] ? setup_fault_attr+0x200/0x200 [ 1496.684652] ? lock_acquire+0x170/0x3c0 [ 1496.688653] __should_failslab+0x115/0x180 [ 1496.693035] should_failslab+0x5/0xf [ 1496.696772] kmem_cache_alloc+0x277/0x370 [ 1496.700974] __alloc_file+0x21/0x330 [ 1496.704714] alloc_empty_file+0x6d/0x170 [ 1496.708797] path_openat+0xe9/0x2df0 [ 1496.709518] [U] ^@ [ 1496.712527] ? __lock_acquire+0x6de/0x3ff0 [ 1496.712552] ? current_time+0x6f/0x1c0 [ 1496.722995] ? path_lookupat+0x8d0/0x8d0 [ 1496.727072] ? mark_held_locks+0xf0/0xf0 [ 1496.730589] [U] ^@ [ 1496.731154] ? shmem_setattr+0x2d0/0xc90 [ 1496.737353] do_filp_open+0x18c/0x3f0 [ 1496.741170] ? may_open_dev+0xf0/0xf0 [ 1496.744988] ? __alloc_fd+0x28d/0x570 [ 1496.748806] ? lock_downgrade+0x720/0x720 [ 1496.752969] ? lock_acquire+0x170/0x3c0 [ 1496.756963] ? __alloc_fd+0x34/0x570 [ 1496.760728] ? do_raw_spin_unlock+0x171/0x230 [ 1496.765245] ? _raw_spin_unlock+0x29/0x40 [ 1496.769407] ? __alloc_fd+0x28d/0x570 [ 1496.773500] do_sys_open+0x3b3/0x520 [ 1496.777245] ? filp_open+0x70/0x70 [ 1496.780802] ? check_preemption_disabled+0x41/0x280 [ 1496.785844] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1496.790619] ? trace_hardirqs_off_caller+0x69/0x210 [ 1496.795659] ? do_syscall_64+0x21/0x620 [ 1496.799657] do_syscall_64+0xf9/0x620 [ 1496.803477] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1496.808677] RIP: 0033:0x416911 [ 1496.811875] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1496.830793] RSP: 002b:00007f23d9459a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1496.838520] RAX: ffffffffffffffda RBX: 000000000050a0c0 RCX: 0000000000416911 [ 1496.845808] RDX: 00007f23d9459b0a RSI: 0000000000000002 RDI: 00007f23d9459b00 13:26:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5413, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:48 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) connect$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x148}, 0xe) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000000)=@gcm_128={{0x304}, "51e2289cc2457d99", "e3b15ab3c625aba25c8d260e004dd38e", "05bcd8b0", "13cc1b6904f12767"}, 0x28) getsockopt$bt_BT_SNDMTU(r4, 0x112, 0xc, 0x0, 0x0) 13:26:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) [ 1496.853087] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 000000000000000a [ 1496.860374] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 1496.867660] R13: 0000000000000c2b R14: 00000000004ce79f R15: 00007f23d945a6d4 13:26:48 executing program 0 (fault-call:1 fault-nth:9): syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX]) 13:26:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5414, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) connect$bt_rfcomm(r2, &(0x7f0000000080)={0x1f, @none, 0x1}, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x3a) r5 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) r6 = socket$inet6(0xa, 0x3, 0x3a) r7 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) fstat(r9, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r10, 0x0) ioctl$TUNSETOWNER(r7, 0x400454cc, r10) sendfile(r4, r5, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x5, 0x70, 0x1, 0x2a, 0x3f, 0x90, 0x0, 0x1, 0x0, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0x9}, 0x1000, 0x2, 0x7, 0x6, 0x0, 0x4, 0x1000}, r5, 0xa, 0xffffffffffffffff, 0x1) [ 1496.984727] hfs: unable to parse mount options 13:26:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5415, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x']) 13:26:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,qu', @ANYRESHEX]) 13:26:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) 13:26:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) ptrace$pokeuser(0x6, r4, 0x9246, 0x0) sched_getscheduler(r4) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) [ 1497.115293] FAULT_INJECTION: forcing a failure. [ 1497.115293] name failslab, interval 1, probability 0, space 0, times 0 [ 1497.150481] CPU: 1 PID: 24194 Comm: syz-executor.0 Not tainted 4.19.130-syzkaller #0 13:26:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) [ 1497.158427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1497.167798] Call Trace: [ 1497.170421] dump_stack+0x1fc/0x2fe [ 1497.174098] should_fail.cold+0xa/0x14 [ 1497.178035] ? setup_fault_attr+0x200/0x200 [ 1497.182372] ? lock_acquire+0x170/0x3c0 [ 1497.186365] __should_failslab+0x115/0x180 [ 1497.190611] should_failslab+0x5/0xf [ 1497.194333] kmem_cache_alloc+0x277/0x370 [ 1497.198501] selinux_file_alloc_security+0xaf/0x190 [ 1497.203536] security_file_alloc+0x40/0x90 [ 1497.207779] __alloc_file+0xc9/0x330 [ 1497.211482] alloc_empty_file+0x6d/0x170 [ 1497.215535] path_openat+0xe9/0x2df0 [ 1497.219242] ? __lock_acquire+0x6de/0x3ff0 [ 1497.223472] ? current_time+0x6f/0x1c0 [ 1497.227348] ? path_lookupat+0x8d0/0x8d0 [ 1497.231402] ? mark_held_locks+0xf0/0xf0 [ 1497.235453] ? shmem_setattr+0x2d0/0xc90 [ 1497.239503] do_filp_open+0x18c/0x3f0 [ 1497.243291] ? may_open_dev+0xf0/0xf0 [ 1497.247085] ? __alloc_fd+0x28d/0x570 [ 1497.250877] ? lock_downgrade+0x720/0x720 [ 1497.255014] ? lock_acquire+0x170/0x3c0 [ 1497.258977] ? __alloc_fd+0x34/0x570 [ 1497.262679] ? do_raw_spin_unlock+0x171/0x230 [ 1497.267194] ? _raw_spin_unlock+0x29/0x40 [ 1497.271379] ? __alloc_fd+0x28d/0x570 [ 1497.275189] do_sys_open+0x3b3/0x520 [ 1497.278904] ? filp_open+0x70/0x70 [ 1497.282442] ? check_preemption_disabled+0x41/0x280 [ 1497.287457] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1497.292205] ? trace_hardirqs_off_caller+0x69/0x210 [ 1497.297214] ? do_syscall_64+0x21/0x620 [ 1497.301177] do_syscall_64+0xf9/0x620 [ 1497.304971] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1497.310146] RIP: 0033:0x416911 [ 1497.313329] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1497.332235] RSP: 002b:00007f23d9459a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1497.339939] RAX: ffffffffffffffda RBX: 000000000050a0c0 RCX: 0000000000416911 [ 1497.347289] RDX: 00007f23d9459b0a RSI: 0000000000000002 RDI: 00007f23d9459b00 [ 1497.354544] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 000000000000000a 13:26:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x2) [ 1497.361814] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 1497.369109] R13: 0000000000000c2b R14: 00000000004ce79f R15: 00007f23d945a6d4 13:26:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5416, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:49 executing program 1 (fault-call:4 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0']) 13:26:49 executing program 0 (fault-call:1 fault-nth:10): syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX]) 13:26:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x2709c1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x14, 0x5, 0x1, 0x301, 0x0, 0x0, {0x5}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x140}, 0x1) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000940)='/dev/cachefiles\x00', 0x105000, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r4, 0xc0bc5351, &(0x7f00000005c0)={0x7f, 0x0, 'client0\x00', 0xb, "aee8c4e65b606983", "c8f37e5431b84ed0ac1c313482f3c5a5b60e728ca382d7a9ecd4d7d32e4a037a", 0x1, 0x10001}) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000040)={{{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @in6=@mcast2, 0x4e23, 0x941, 0x4e20, 0x40, 0x2, 0x20, 0x20, 0xff, 0x0, 0xee01}, {0x7f, 0x2, 0x2, 0x1, 0x4, 0x5, 0x3a5d7bb9, 0x3f8}, {0xfff, 0x6c0a, 0x3f, 0x1}, 0x6, 0x6e6bc0, 0x0, 0x1, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d3, 0x2b}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x34ff, 0x3, 0x3, 0x63, 0x8, 0x1, 0x2}}, 0xe8) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r3, &(0x7f0000000740)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000700)={&(0x7f0000000780)=ANY=[@ANYBLOB="1c645f16", @ANYRES16=0x0, @ANYBLOB="02002cbd7000ffdbdf250e00000008000300", @ANYRES32=0x0, @ANYBLOB="23f1ff00002100df46ba7a"], 0x1c}, 0x1, 0x0, 0x0, 0x4040004}, 0x6edc706f611661ac) r5 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r7 = socket$inet6(0xa, 0x3, 0x3a) r8 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r7, r8, 0x0, 0x0) getsockopt$nfc_llcp(r8, 0x118, 0x3, &(0x7f0000000980)=""/161, 0xa1) r9 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r9, 0x0, 0x60, &(0x7f0000000180)={'filter\x00', 0x7, 0x4, 0x3e0, 0x0, 0x110, 0x210, 0x2f8, 0x2f8, 0x2f8, 0x4, &(0x7f0000000140), {[{{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @private=0xa010100, @broadcast, 0x2, 0xffffffff}}}, {{@uncond, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x9, 0x9}}}, {{@arp={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0x0, 0xff0000ff, 0x0, 0x2, {@empty, {[0x1fe, 0xff, 0xff, 0xff, 0xff, 0xff]}}, {@mac, {[0x0, 0xff, 0xff]}}, 0x441, 0xfff, 0x9, 0x401, 0x9, 0x4, 'veth1_macvtap\x00', 'syzkaller0\x00', {}, {0xff}, 0x0, 0x4}, 0xc0, 0xe8}, @unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x4, 0xccc}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x430) getsockopt$bt_BT_SNDMTU(r6, 0x112, 0xc, 0x0, 0x0) 13:26:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,', @ANYRESHEX]) 13:26:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, &(0x7f0000000080)) [ 1497.593816] x_tables: duplicate underflow at hook 1 13:26:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r3 = socket$inet6(0xa, 0x3, 0x3a) r4 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) getsockopt$inet6_tcp_int(r4, 0x6, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) 13:26:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5418, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) [ 1497.657942] FAULT_INJECTION: forcing a failure. [ 1497.657942] name failslab, interval 1, probability 0, space 0, times 0 [ 1497.702989] CPU: 0 PID: 24224 Comm: syz-executor.1 Not tainted 4.19.130-syzkaller #0 [ 1497.710924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1497.720301] Call Trace: [ 1497.722921] dump_stack+0x1fc/0x2fe [ 1497.726576] should_fail.cold+0xa/0x14 [ 1497.730502] ? setup_fault_attr+0x200/0x200 [ 1497.734844] ? lock_acquire+0x170/0x3c0 [ 1497.738850] __should_failslab+0x115/0x180 [ 1497.743109] should_failslab+0x5/0xf [ 1497.746837] __kmalloc+0x2ab/0x3c0 [ 1497.750511] ? __se_sys_memfd_create+0xf8/0x440 [ 1497.755202] __se_sys_memfd_create+0xf8/0x440 [ 1497.759714] ? memfd_file_seals_ptr+0x150/0x150 [ 1497.764404] ? posix_timer_fn+0x3d0/0x3d0 [ 1497.768576] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1497.773354] ? trace_hardirqs_off_caller+0x69/0x210 [ 1497.778396] ? do_syscall_64+0x21/0x620 [ 1497.782391] do_syscall_64+0xf9/0x620 [ 1497.786211] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1497.791408] RIP: 0033:0x45cb19 13:26:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5419, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:49 executing program 4: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000001c0)={r0, 0x88}, &(0x7f0000000280)={'enc=', 'oaep', ' hash=', {'sha1-avx2\x00'}}, &(0x7f0000000300)="3459fdf216b5ec22d6c1e23648b2554a2700e17e9b53dd8f5eb10cb7f35b5bd4394c0f42068ae203df45151161c0d5fdc67b349829784d690169fa6fb29b879190ca62485cec0e9f02a42cc8dbd9694f5c70bd669b70785be1c8c6c8d761b832bc17b7ed4a40a5bf0ac7165e18706c0d474f39ab32e05633fdf2e5b9d42cbfa724c72f8dbde10bda", &(0x7f0000000200)) r1 = socket$inet6(0xa, 0x3, 0x3a) r2 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xffffffffffffffff) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000180)={0x0, 'team_slave_0\x00', 0x3}, 0x18) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bsg\x00', 0x4000, 0x0) ioctl$KDENABIO(r6, 0x4b36) getsockopt$bt_BT_SNDMTU(r5, 0x112, 0xc, 0x0, 0x0) r7 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r7, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r7, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0xa4, 0x0, 0x9, 0x0, 0x0, 0x0, {0x3, 0x0, 0x3}, [@NFCTH_TUPLE={0x58, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}]}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x7f}}, @NFCTH_TUPLE={0x10, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}]}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x10}]}, 0xa4}}, 0x4040) [ 1497.794610] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1497.813626] RSP: 002b:00007f80a0512a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1497.821354] RAX: ffffffffffffffda RBX: 000000000050a0c0 RCX: 000000000045cb19 [ 1497.828635] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1c71 [ 1497.835902] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000001 [ 1497.843169] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 13:26:49 executing program 2 (fault-call:4 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) [ 1497.850432] R13: 0000000000000c2b R14: 00000000004ce79f R15: 00007f80a05136d4 [ 1497.875326] FAULT_INJECTION: forcing a failure. [ 1497.875326] name failslab, interval 1, probability 0, space 0, times 0 [ 1497.890204] CPU: 0 PID: 24251 Comm: syz-executor.0 Not tainted 4.19.130-syzkaller #0 [ 1497.898112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1497.907461] Call Trace: [ 1497.910063] dump_stack+0x1fc/0x2fe [ 1497.913706] should_fail.cold+0xa/0x14 [ 1497.917606] ? setup_fault_attr+0x200/0x200 [ 1497.921914] ? lock_acquire+0x170/0x3c0 [ 1497.925891] __should_failslab+0x115/0x180 [ 1497.930154] should_failslab+0x5/0xf [ 1497.933853] kmem_cache_alloc_trace+0x284/0x380 [ 1497.938510] ? loop_info64_to_compat+0x5e0/0x5e0 [ 1497.943252] __kthread_create_on_node+0xd2/0x410 [ 1497.948012] ? kthread_parkme+0xa0/0xa0 [ 1497.951983] ? lo_ioctl+0x1bb/0x20e0 [ 1497.955694] ? __mutex_lock+0x3a8/0x1260 [ 1497.959754] ? lock_downgrade+0x720/0x720 [ 1497.963888] ? loop_info64_to_compat+0x5e0/0x5e0 [ 1497.968643] kthread_create_on_node+0xbb/0xf0 [ 1497.973139] ? __kthread_create_on_node+0x410/0x410 [ 1497.978145] ? __fget+0x356/0x510 [ 1497.981585] ? do_dup2+0x450/0x450 [ 1497.985125] ? __lockdep_init_map+0x100/0x5a0 [ 1497.989622] ? __lockdep_init_map+0x100/0x5a0 [ 1497.994103] lo_ioctl+0xae5/0x20e0 [ 1497.997645] ? loop_set_status64+0x110/0x110 [ 1498.002049] blkdev_ioctl+0x5cb/0x1a7e [ 1498.005936] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1498.011293] ? blkpg_ioctl+0x9d0/0x9d0 [ 1498.015170] ? mark_held_locks+0xf0/0xf0 [ 1498.019215] ? mark_held_locks+0xf0/0xf0 [ 1498.023264] ? debug_check_no_obj_freed+0x201/0x482 [ 1498.028284] ? lock_downgrade+0x720/0x720 [ 1498.032428] block_ioctl+0xe9/0x130 [ 1498.036040] ? blkdev_fallocate+0x3f0/0x3f0 [ 1498.040357] do_vfs_ioctl+0xcdb/0x12e0 [ 1498.044248] ? selinux_file_ioctl+0x506/0x6c0 [ 1498.048745] ? ioctl_preallocate+0x200/0x200 [ 1498.053138] ? selinux_inode_link+0x20/0x20 [ 1498.057446] ? __fget+0x356/0x510 [ 1498.060909] ? do_dup2+0x450/0x450 [ 1498.064457] ksys_ioctl+0x9b/0xc0 [ 1498.067918] __x64_sys_ioctl+0x6f/0xb0 [ 1498.071800] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1498.076379] do_syscall_64+0xf9/0x620 [ 1498.080181] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1498.085365] RIP: 0033:0x45c9e7 [ 1498.088557] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1498.107461] RSP: 002b:00007f23d9459a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1498.115183] RAX: ffffffffffffffda RBX: 000000000050a0c0 RCX: 000000000045c9e7 13:26:49 executing program 1 (fault-call:4 fault-nth:1): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0']) [ 1498.122436] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1498.129692] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 000000000000000a [ 1498.136950] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1498.144213] R13: 0000000000000c2b R14: 00000000004ce79f R15: 00007f23d945a6d4 13:26:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,', @ANYRESHEX]) 13:26:49 executing program 0 (fault-call:1 fault-nth:11): syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX]) 13:26:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x541a, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) 13:26:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r1, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x20080, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x5) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, 0x0, 0x0) [ 1498.355725] FAULT_INJECTION: forcing a failure. [ 1498.355725] name failslab, interval 1, probability 0, space 0, times 0 [ 1498.368242] CPU: 0 PID: 24267 Comm: syz-executor.1 Not tainted 4.19.130-syzkaller #0 [ 1498.376936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1498.386299] Call Trace: [ 1498.388913] dump_stack+0x1fc/0x2fe [ 1498.392562] should_fail.cold+0xa/0x14 [ 1498.396476] ? setup_fault_attr+0x200/0x200 [ 1498.400811] ? lock_acquire+0x170/0x3c0 [ 1498.404805] __should_failslab+0x115/0x180 [ 1498.409059] should_failslab+0x5/0xf [ 1498.412784] kmem_cache_alloc+0x277/0x370 [ 1498.416946] ? shmem_destroy_callback+0xb0/0xb0 [ 1498.421627] shmem_alloc_inode+0x18/0x40 [ 1498.425700] ? shmem_destroy_callback+0xb0/0xb0 [ 1498.430378] alloc_inode+0x5d/0x180 [ 1498.434006] new_inode+0x1d/0xf0 [ 1498.437380] shmem_get_inode+0x96/0x8d0 [ 1498.441379] __shmem_file_setup.part.0+0x7a/0x2b0 [ 1498.446244] shmem_file_setup+0x61/0x90 [ 1498.450229] __se_sys_memfd_create+0x26b/0x440 13:26:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x6, 0xc, 0x0, 0x0) [ 1498.454820] ? memfd_file_seals_ptr+0x150/0x150 [ 1498.459497] ? posix_timer_fn+0x3d0/0x3d0 [ 1498.463656] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1498.468420] ? trace_hardirqs_off_caller+0x69/0x210 [ 1498.473447] ? do_syscall_64+0x21/0x620 [ 1498.477440] do_syscall_64+0xf9/0x620 [ 1498.481254] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1498.486456] RIP: 0033:0x45cb19 13:26:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x541b, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:50 executing program 1 (fault-call:4 fault-nth:2): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0']) [ 1498.489655] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1498.508564] RSP: 002b:00007f80a0512a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1498.516287] RAX: ffffffffffffffda RBX: 000000000050a0c0 RCX: 000000000045cb19 [ 1498.523569] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1c71 [ 1498.530851] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000001 [ 1498.538129] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1498.545411] R13: 0000000000000c2b R14: 00000000004ce79f R15: 00007f80a05136d4 13:26:50 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX]) 13:26:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,', @ANYRESHEX]) 13:26:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = socket$inet6(0xa, 0x3, 0x3a) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000280)=""/233, 0xe9}, {&(0x7f00000001c0)=""/54, 0x36}, {&(0x7f0000000380)=""/83, 0x53}], 0x3, &(0x7f0000000940)=""/4096, 0x1000}, 0x160) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000480)={0x0, @adiantum}) r3 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x2) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r4, 0x112, 0xc, 0x0, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r9 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r9, 0xc0506617, &(0x7f0000000000)=ANY=[@ANYRES32=r9, @ANYRESDEC=r3, @ANYRESDEC=r0]) 13:26:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') r1 = socket$inet6(0xa, 0x3, 0x3a) r2 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) r3 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r3, 0x0) getsockopt$netrom_NETROM_T1(r3, 0x103, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0x4) sendfile(r1, r2, 0x0, 0x0) ioctl$KDGETMODE(r2, 0x4b3b, &(0x7f0000000080)) dup2(r0, r0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r4, 0x112, 0xc, 0x0, 0x0) 13:26:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x541d, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r3 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r3, 0x0) write$tun(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x22) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) [ 1498.838749] FAULT_INJECTION: forcing a failure. [ 1498.838749] name failslab, interval 1, probability 0, space 0, times 0 13:26:50 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX]) 13:26:50 executing program 2: remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x10001, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r3, @ANYBLOB="0000400000000002280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@ipv4_newaddr={0x30, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0xa0, 0x0, r3}, [@IFA_LOCAL={0x8, 0x2, @multicast2}, @IFA_BROADCAST={0x8, 0x4, @broadcast}, @IFA_FLAGS={0x8, 0x8, 0x400}]}, 0x30}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="000097a1", @ANYRES16=0x0, @ANYBLOB="000826bd7000fcdbdf251100000008000300", @ANYRES32=0x0, @ANYBLOB="080034000900000008000300", @ANYRES32=r3, @ANYBLOB="0a0009000000000000000000050038000000000005002d0001000000"], 0x48}, 0x1, 0x0, 0x0, 0x20040080}, 0x10) close(0xffffffffffffffff) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB="200000ede3000000840000000200"/28, @ANYRES32=r5], 0x20}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000080)={r5, @in6={{0xa, 0x4e23, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x100}}}, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000001c0)={r5, 0x800}, 0x8) r6 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$bt_BT_SNDMTU(r7, 0x112, 0xc, 0x0, 0x0) [ 1498.879752] CPU: 1 PID: 24338 Comm: syz-executor.1 Not tainted 4.19.130-syzkaller #0 [ 1498.887682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1498.897049] Call Trace: [ 1498.899663] dump_stack+0x1fc/0x2fe [ 1498.903317] should_fail.cold+0xa/0x14 [ 1498.907228] ? setup_fault_attr+0x200/0x200 [ 1498.911566] ? get_pid_task+0xf4/0x190 [ 1498.915483] __should_failslab+0x115/0x180 [ 1498.919733] should_failslab+0x5/0xf [ 1498.923459] kmem_cache_alloc+0x277/0x370 [ 1498.927629] selinux_inode_alloc_security+0xb1/0x2a0 [ 1498.932754] security_inode_alloc+0x67/0xc0 [ 1498.937092] inode_init_always+0x5a3/0xb70 [ 1498.941349] alloc_inode+0x7a/0x180 [ 1498.944988] new_inode+0x1d/0xf0 [ 1498.948368] shmem_get_inode+0x96/0x8d0 [ 1498.952370] __shmem_file_setup.part.0+0x7a/0x2b0 [ 1498.957229] shmem_file_setup+0x61/0x90 [ 1498.961213] __se_sys_memfd_create+0x26b/0x440 [ 1498.965806] ? memfd_file_seals_ptr+0x150/0x150 [ 1498.969108] audit: type=1800 audit(1593178010.517:136): pid=24348 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16450 res=0 [ 1498.970477] ? posix_timer_fn+0x3d0/0x3d0 [ 1498.970495] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1498.970513] ? trace_hardirqs_off_caller+0x69/0x210 [ 1499.004074] ? do_syscall_64+0x21/0x620 [ 1499.008062] do_syscall_64+0xf9/0x620 [ 1499.011878] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1499.017067] RIP: 0033:0x45cb19 [ 1499.020242] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1499.039128] RSP: 002b:00007f80a04f1a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1499.046819] RAX: ffffffffffffffda RBX: 000000000050a0c0 RCX: 000000000045cb19 [ 1499.054072] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1c71 [ 1499.061324] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000001 [ 1499.068576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 13:26:50 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0xf2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsu\x00', 0x2000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x80009) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$ARPT_SO_GET_INFO(r2, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) getsockopt$bt_BT_SNDMTU(r4, 0x112, 0xc, 0x0, 0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x40000, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r5, 0x84, 0x16, &(0x7f0000000180)={0x1, [0x4a0]}, 0x6) 13:26:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x541e, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:50 executing program 1 (fault-call:4 fault-nth:3): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0']) [ 1499.075828] R13: 0000000000000c2b R14: 00000000004ce79f R15: 00007f80a04f26d4 [ 1499.164628] hfs: unable to parse mount options 13:26:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5421, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gi', @ANYRESHEX]) 13:26:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3a) r2 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)=0x1) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000000)) r4 = dup2(r3, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) socket$inet6(0xa, 0x3, 0x3a) r5 = open(&(0x7f0000000080)='./file0/bus\x00', 0x400000, 0x1a4) sendfile(r5, 0xffffffffffffffff, 0x0, 0x10) socket$inet6(0xa, 0x2, 0x3a) r6 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r6, 0xffffffffffffffff, 0x0, 0x4) r7 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x133) fchmod(r7, 0x0) getsockopt$bt_BT_SNDMTU(r7, 0x112, 0xc, 0x0, 0x0) [ 1499.282156] hfs: invalid gid -1 [ 1499.287201] hfs: unable to parse mount options [ 1499.299996] FAULT_INJECTION: forcing a failure. [ 1499.299996] name failslab, interval 1, probability 0, space 0, times 0 [ 1499.316553] CPU: 0 PID: 24379 Comm: syz-executor.1 Not tainted 4.19.130-syzkaller #0 [ 1499.324469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1499.333832] Call Trace: [ 1499.336432] dump_stack+0x1fc/0x2fe [ 1499.340080] should_fail.cold+0xa/0x14 [ 1499.343999] ? setup_fault_attr+0x200/0x200 [ 1499.348334] ? lock_acquire+0x170/0x3c0 [ 1499.352342] __should_failslab+0x115/0x180 [ 1499.356597] should_failslab+0x5/0xf [ 1499.360323] kmem_cache_alloc+0x277/0x370 [ 1499.364485] __d_alloc+0x2b/0xa10 [ 1499.367949] d_alloc_pseudo+0x19/0x70 [ 1499.371761] alloc_file_pseudo+0xc6/0x250 [ 1499.375993] ? check_preemption_disabled+0x41/0x280 [ 1499.380997] ? alloc_file+0x4d0/0x4d0 [ 1499.384799] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 1499.390425] ? shmem_get_inode+0x44c/0x8d0 [ 1499.394656] __shmem_file_setup.part.0+0x102/0x2b0 [ 1499.399580] shmem_file_setup+0x61/0x90 [ 1499.403552] __se_sys_memfd_create+0x26b/0x440 [ 1499.408134] ? memfd_file_seals_ptr+0x150/0x150 [ 1499.412797] ? posix_timer_fn+0x3d0/0x3d0 [ 1499.416932] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1499.421673] ? trace_hardirqs_off_caller+0x69/0x210 [ 1499.426693] ? do_syscall_64+0x21/0x620 [ 1499.430667] do_syscall_64+0xf9/0x620 [ 1499.434472] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1499.439658] RIP: 0033:0x45cb19 [ 1499.442834] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1499.461727] RSP: 002b:00007f80a04f1a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1499.469430] RAX: ffffffffffffffda RBX: 000000000050a0c0 RCX: 000000000045cb19 13:26:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5422, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:51 executing program 1 (fault-call:4 fault-nth:4): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0']) [ 1499.476686] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1c71 [ 1499.483946] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000001 [ 1499.491223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1499.498604] R13: 0000000000000c2b R14: 00000000004ce79f R15: 00007f80a04f26d4 13:26:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5423, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:51 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX]) 13:26:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gi', @ANYRESHEX]) [ 1499.694014] FAULT_INJECTION: forcing a failure. [ 1499.694014] name failslab, interval 1, probability 0, space 0, times 0 [ 1499.760462] CPU: 0 PID: 24404 Comm: syz-executor.1 Not tainted 4.19.130-syzkaller #0 [ 1499.768396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1499.777768] Call Trace: [ 1499.780383] dump_stack+0x1fc/0x2fe [ 1499.784034] should_fail.cold+0xa/0x14 [ 1499.787948] ? setup_fault_attr+0x200/0x200 [ 1499.792287] ? lock_acquire+0x170/0x3c0 [ 1499.796285] __should_failslab+0x115/0x180 [ 1499.800538] should_failslab+0x5/0xf [ 1499.804267] kmem_cache_alloc+0x277/0x370 [ 1499.808432] __alloc_file+0x21/0x330 [ 1499.812160] alloc_empty_file+0x6d/0x170 [ 1499.816231] alloc_file+0x5e/0x4d0 [ 1499.819785] alloc_file_pseudo+0x165/0x250 [ 1499.824027] ? alloc_file+0x4d0/0x4d0 [ 1499.827838] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 1499.833483] ? shmem_get_inode+0x44c/0x8d0 [ 1499.837736] __shmem_file_setup.part.0+0x102/0x2b0 [ 1499.842684] shmem_file_setup+0x61/0x90 [ 1499.846673] __se_sys_memfd_create+0x26b/0x440 [ 1499.851268] ? memfd_file_seals_ptr+0x150/0x150 [ 1499.855947] ? posix_timer_fn+0x3d0/0x3d0 [ 1499.860131] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1499.864994] ? trace_hardirqs_off_caller+0x69/0x210 [ 1499.870018] ? do_syscall_64+0x21/0x620 [ 1499.873983] do_syscall_64+0xf9/0x620 [ 1499.877777] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1499.882950] RIP: 0033:0x45cb19 [ 1499.886136] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1499.905041] RSP: 002b:00007f80a04f1a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1499.912751] RAX: ffffffffffffffda RBX: 000000000050a0c0 RCX: 000000000045cb19 [ 1499.920007] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1c71 [ 1499.927263] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000001 [ 1499.934515] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1499.941817] R13: 0000000000000c2b R14: 00000000004ce79f R15: 00007f80a04f26d4 13:26:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, 0x0, 0x0) recvmmsg(r2, &(0x7f0000002340)=[{{&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000180)=[{&(0x7f0000000080)=""/234, 0xea}], 0x1, &(0x7f00000001c0)=""/159, 0x9f}, 0x8}, {{&(0x7f0000000280)=@pppoe, 0x80, &(0x7f0000001700)=[{&(0x7f0000000300)=""/154, 0x9a}, {&(0x7f00000003c0)=""/197, 0xc5}, {&(0x7f00000004c0)=""/198, 0xc6}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/10, 0xa}, {&(0x7f0000001600)=""/126, 0x7e}, {&(0x7f0000001680)=""/124, 0x7c}], 0x7}, 0x40}, {{&(0x7f0000001780)=@nl=@unspec, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001800)=""/186, 0xba}, {&(0x7f00000018c0)=""/5, 0x5}, {&(0x7f0000001900)=""/42, 0x2a}, {&(0x7f0000001940)=""/157, 0x9d}, {&(0x7f0000001a00)=""/218, 0xda}, {&(0x7f0000001b00)=""/7, 0x7}, {&(0x7f0000001b40)=""/182, 0xb6}, {&(0x7f0000001c00)=""/170, 0xaa}], 0x8}, 0x5}, {{0x0, 0x0, &(0x7f0000001d80)=[{&(0x7f0000001d40)=""/18, 0x12}], 0x1, &(0x7f0000001dc0)=""/194, 0xc2}, 0x9}, {{&(0x7f0000001ec0)=@nfc_llcp, 0x80, &(0x7f0000001f80)=[{&(0x7f0000001f40)=""/4, 0x4}], 0x1, &(0x7f0000001fc0)=""/159, 0x9f}, 0x8000}, {{&(0x7f0000002080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000002300)=[{&(0x7f0000002100)=""/146, 0x92}, {&(0x7f00000021c0)=""/126, 0x7e}, {&(0x7f0000002240)=""/151, 0x97}], 0x3}, 0x2fb1}], 0x6, 0x2, &(0x7f00000024c0)={0x77359400}) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180)='NLBL_UNLBL\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80020}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYRES64=r6, @ANYRES16=r4], 0xd0}, 0x1, 0x0, 0x0, 0x8090}, 0x44) sendmsg$NLBL_UNLABEL_C_STATICLIST(r3, &(0x7f0000002680)={&(0x7f0000002500)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002640)={&(0x7f0000002540)={0xe4, r4, 0x8, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_SECCTX={0x28, 0x7, 'system_u:object_r:clock_device_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x2a, 0x7, 'system_u:object_r:ssh_agent_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'team_slave_1\x00'}, @NLBL_UNLABEL_A_SECCTX={0x2a, 0x7, 'system_u:object_r:ssh_agent_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private1={0xfc, 0x1, [], 0x1}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}]}, 0xe4}, 0x1, 0x0, 0x0, 0x200000c0}, 0x40000) 13:26:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5424, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:51 executing program 1 (fault-call:4 fault-nth:5): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0']) 13:26:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r2 = dup2(r0, r1) connect(r2, &(0x7f0000000000)=@l2tp={0x2, 0x0, @broadcast}, 0x80) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x405200, 0x0) ioctl$VFIO_CHECK_EXTENSION(r3, 0x3b65, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r4, 0x112, 0xc, 0x0, 0x0) 13:26:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5425, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:51 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0xf402000000000000, 0x40, &(0x7f0000000280)=@raw={'raw\x00', 0x2, 0x3, 0x260, 0xf8, 0xf8, 0x0, 0x0, 0xf8, 0x1c8, 0x190, 0x190, 0x1c8, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00', {}, {}, 0x0, 0x0, 0x2}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev={[], 0x31}, 0x37, 0xf, [0x9, 0x1d, 0x17, 0x12, 0x32, 0x26, 0x7, 0x24, 0x26, 0x9, 0x1c, 0x4, 0x35, 0x3a, 0x21, 0x25], 0x0, 0x100, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r3 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r3, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r3, 0x6431) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r5 = socket$inet6(0xa, 0x3, 0x3a) r6 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x0) r7 = accept4$inet6(r6, 0x0, &(0x7f0000000000), 0x800) r8 = dup2(r7, r2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_SNDMTU(r9, 0x112, 0xc, 0x0, 0x0) 13:26:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5427, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="0fb06ab876fe10f21c3064cbb46b120ba560b8726ad8fecd0a7262b48056c4efc64aa1a76d1c1c25a7b86f6b8ed2252fdc3dcecc20a2a1da70eb", 0x3a}, {&(0x7f0000000040)="164a23153531127fed87a728ab2693e3d432f37547b4d50d9cc3e879d2afe0e7cba55853c847d507ec1de13eb1e28dc7e0514d67737b90787bace1f3768fbdb8a270a9cd27a0196f696ea772f684880e1b30cb1348e1ea89ceca671691c14621ed5937930d4d1b301068725220810a2f0c13984d194a5704780b2333017cf533761ee2a252a308e8b848fd80", 0x8c}, {&(0x7f0000000100)="1675986333c851747a395d4465eafa438b6e39291f37ba8ae3439ad8c6f7b10cee60da136199d7ec4334a1c027cdb419703b41d08862a78537e167fc5636f950362915a1a83bab299754d9a17e3e275cb3b83301d41f5bebbb8950649ba79aa9c727b27d768cee5b53812af6ab93d7415fd91a298a1a456b3abee5a176d552f220ef33ef90d1d8683769415b5627ee5c229c576bb5d4f66b0c9aae62a3829e2f627929ff228c6841917b783941843c2dc0639f4e5d33020e2e53c8fa356d7164bc0f582383fd368e8b241b401bfcb9a054f6030b580d5a", 0xd7}], 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0xf8}, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) r4 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r4, 0x0) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r6 = socket(0xa, 0x1, 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @local, 0x40000009}], 0x1c) sendmmsg$inet_sctp(r6, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB="200000ede3000000840000000200"/28, @ANYRES32], 0x20}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r5, 0x84, 0x5, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e23, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x100}}}, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f00000004c0)={0x0, 0x88, &(0x7f0000000400)=[@in={0x2, 0x4e20, @empty}, @in6={0xa, 0x4e22, 0x5, @private2={0xfc, 0x2, [], 0x1}, 0x7}, @in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0xfde, @ipv4={[], [], @rand_addr=0x64010100}, 0x8}, @in={0x2, 0x0, @private=0xa010100}, @in={0x2, 0x4e24, @private=0xa010102}, @in={0x2, 0x4e24, @multicast2}]}, &(0x7f0000000500)=0x10) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f00000005c0)=ANY=[@ANYRES32=r8, @ANYBLOB="f7ff0000ee0b969f86c74717ab32d61c453ee72a2028d57f25b4a651db28aae5c0051de08ed921aca9094cafaab53d9a570dcef560e2949cd307eed2a1e841fd4a9ebf6367a4c5c693508ceadd48bbcaf11d6b100a22b2900af891b75e1c0a0dca3cc3f32dcd32cb50312f57576c"], 0x8) mknodat(r1, &(0x7f0000000380)='.\x00', 0x2, 0x400) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) 13:26:51 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX]) 13:26:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x40a681, 0x0) r1 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r1, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x5, 0x6e80) r2 = socket$inet6(0xa, 0x4, 0x3a) r3 = open(&(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x3a) r5 = open(&(0x7f0000000140)='./file0/bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x8) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r6, 0x112, 0xc, 0x0, 0x0) r7 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(0xffffffffffffffff, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000100)) fchmod(r7, 0x0) ioctl$TIOCSERGETLSR(r7, 0x5459, &(0x7f0000000080)) [ 1500.229637] FAULT_INJECTION: forcing a failure. [ 1500.229637] name failslab, interval 1, probability 0, space 0, times 0 [ 1500.264831] hfs: unable to parse mount options [ 1500.319597] CPU: 1 PID: 24458 Comm: syz-executor.1 Not tainted 4.19.130-syzkaller #0 [ 1500.327525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1500.336888] Call Trace: [ 1500.339507] dump_stack+0x1fc/0x2fe [ 1500.343159] should_fail.cold+0xa/0x14 [ 1500.347070] ? setup_fault_attr+0x200/0x200 [ 1500.351409] ? lock_acquire+0x170/0x3c0 [ 1500.355406] __should_failslab+0x115/0x180 [ 1500.359657] should_failslab+0x5/0xf [ 1500.363385] kmem_cache_alloc+0x277/0x370 [ 1500.367550] selinux_file_alloc_security+0xaf/0x190 [ 1500.373704] security_file_alloc+0x40/0x90 [ 1500.377951] __alloc_file+0xc9/0x330 [ 1500.381679] alloc_empty_file+0x6d/0x170 [ 1500.385750] alloc_file+0x5e/0x4d0 [ 1500.389310] alloc_file_pseudo+0x165/0x250 [ 1500.393556] ? alloc_file+0x4d0/0x4d0 [ 1500.397374] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 1500.403164] ? shmem_get_inode+0x44c/0x8d0 [ 1500.407422] __shmem_file_setup.part.0+0x102/0x2b0 [ 1500.412374] shmem_file_setup+0x61/0x90 13:26:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5428, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gi', @ANYRESHEX]) 13:26:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x2) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$get_security(0x11, r4, &(0x7f0000000000)=""/251, 0xfb) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) 13:26:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) close(r3) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x400, 0x0) fsetxattr$security_evm(r4, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="02d72bcb84b6706cc8476374389da03b65a162a44137bb959c2289e05870b36ac351caea92b6a602e741953cdfdf98c92256e19a5703"], 0xc, 0x1) [ 1500.416363] __se_sys_memfd_create+0x26b/0x440 [ 1500.420962] ? memfd_file_seals_ptr+0x150/0x150 [ 1500.425642] ? posix_timer_fn+0x3d0/0x3d0 [ 1500.429806] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1500.434572] ? trace_hardirqs_off_caller+0x69/0x210 [ 1500.439613] ? do_syscall_64+0x21/0x620 [ 1500.443609] do_syscall_64+0xf9/0x620 [ 1500.447435] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1500.452635] RIP: 0033:0x45cb19 13:26:52 executing program 1 (fault-call:4 fault-nth:6): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0']) 13:26:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5429, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) [ 1500.455845] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1500.474770] RSP: 002b:00007f80a04f1a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1500.482498] RAX: ffffffffffffffda RBX: 000000000050a0c0 RCX: 000000000045cb19 [ 1500.489786] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1c71 [ 1500.497072] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000001 [ 1500.504351] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1500.511629] R13: 0000000000000c2b R14: 00000000004ce79f R15: 00007f80a04f26d4 13:26:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0x5, &(0x7f00000003c0)=0x0) io_submit(r3, 0x5, &(0x7f00000007c0)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0}, &(0x7f0000000700)={0x0, 0x0, 0x8, 0x0, 0x0, 0xffffffffffffffff, 0x0}, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8, 0xbf26, 0xffffffffffffffff, &(0x7f00000000c0)="7ca7a9648b49342918b8a5d899f0bf2b1f356d1da3442aa3693c234a16e96c0a572543efc6019cea02c6e3365cad435353f5563475c054010bbf9f6efaf0a457b22d9d8417bd4735b6016719e3cf647e1c69ee62a176f1db269358312496bc18d275e16128da01245f9674f6a132cba0fedfa9910d2dfdf8db65fbb96b9711ed37e6b68b3a9e", 0x86, 0x9, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0xa, 0x5, 0xffffffffffffffff, &(0x7f0000000580)="9a663afea4c0c75dbe11aad7848a2c348e9e9d4885ca1a3c00f20f9c63e2f773b99223bbc731d71678faa7dd18d1a3a653a31775f8189cd2517eba846103f1fe4866842560c7ecb9b0d23aef806cb753c11459ba65daf412857b4b60e5823ba010d5b3cdf5ce5570db5052d7480e750001a17af2c58d119c0e197382dca7ea00343cdb06ff6190fa6bf557b8dde7baa40b1eaca24954d5ecf0cb69d1b9ec538dddd6c8752a6cdbda07fef442a54ab04c0e0977e6dfd821f32be4d6da55af717d34054d6a69a9afac960e", 0xca, 0x1604, 0x0, 0x1}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x5, 0x3254, 0xffffffffffffffff, &(0x7f0000000680)="6798d9dcb16b8f6e00e506925105e2246131476296eaaf050beba9d4c74c167aaca5893c9a35ebba980abdbaedcadf25c8db71ecf9c6add288556eeefdbb3ff2a253492930dbde15836b142e77395000bb0a7cb48c65d1b1f5f9630e814c9d82", 0x60, 0xffffffffffffffc1}]) r4 = socket$inet6(0xa, 0x1, 0x3a) r5 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x0) r6 = socket$inet6(0xa, 0x3, 0x3a) r7 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x0) r8 = accept4$vsock_stream(r7, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @host}, 0x10, 0x80000) r9 = socket$inet6(0xa, 0x3, 0x3a) r10 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r9, r10, 0x0, 0x0) r11 = openat$cgroup_type(r10, &(0x7f00000001c0)='cgroup.type\x00', 0x2, 0x0) r12 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x40080, 0x0) io_submit(r3, 0x3, &(0x7f0000000300)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x6, 0x0, r2, &(0x7f0000000340)="9b051eae", 0x4, 0x1ff, 0x0, 0x1, r5}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x7, 0x0, r8, &(0x7f0000000400)="65d41292b24b3a3bb8f6024c3fbf3164ec19135578acd758ec617d8060273096b99fd441d5de0202b18b1e61e5b8a0ab86f83d3edb185e892d822a6c85cad5a3026ed4175cfaea3cedb2485150490292e6fac4480f74a49fcdbb428c0bb02ae176e6d08d831772e4d1df166754b1062fea333e4b57dbd49cce2d0fb703a110a639e583fac359aa68cb9355de9f3988eb165100c679d519", 0x97, 0x10000, 0x0, 0x3, r1}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x6, 0xfffb, r11, &(0x7f0000000200)="b32c4e371f51c996da1b7c434120fbbf4af449dc71a6ebea94a4f03983b0bae719f83a9394d50e61ac187a2a81b4259f806a357d6ef6c8b952495b16dfed40c0a4124eb3b46742017df508d08e849220", 0x50, 0x8000, 0x0, 0x5, r12}]) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) 13:26:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid', @ANYRESHEX]) 13:26:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5432, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:52 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX]) [ 1500.732814] FAULT_INJECTION: forcing a failure. [ 1500.732814] name failslab, interval 1, probability 0, space 0, times 0 [ 1500.757238] CPU: 0 PID: 24522 Comm: syz-executor.1 Not tainted 4.19.130-syzkaller #0 [ 1500.765168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1500.774540] Call Trace: [ 1500.777154] dump_stack+0x1fc/0x2fe [ 1500.780812] should_fail.cold+0xa/0x14 [ 1500.784731] ? setup_fault_attr+0x200/0x200 [ 1500.789070] ? lock_acquire+0x170/0x3c0 [ 1500.793067] __should_failslab+0x115/0x180 [ 1500.797316] should_failslab+0x5/0xf [ 1500.801040] kmem_cache_alloc+0x277/0x370 [ 1500.805205] getname_flags+0xce/0x590 [ 1500.809027] do_sys_open+0x26c/0x520 [ 1500.812752] ? filp_open+0x70/0x70 [ 1500.816304] ? check_preemption_disabled+0x41/0x280 [ 1500.821334] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1500.826099] ? trace_hardirqs_off_caller+0x69/0x210 [ 1500.831127] ? do_syscall_64+0x21/0x620 [ 1500.835123] do_syscall_64+0xf9/0x620 [ 1500.838936] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1500.844127] RIP: 0033:0x416911 [ 1500.847321] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1500.866229] RSP: 002b:00007f80a04f1a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1500.873975] RAX: ffffffffffffffda RBX: 000000000050a0c0 RCX: 0000000000416911 13:26:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x4a}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffffffe1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507193c3213e63e3a8a00000000", @ANYRES32=r1, @ANYBLOB="0000400000000002280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@ipv4_newaddr={0x30, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0xa0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast2}, @IFA_BROADCAST={0x8, 0x4, @broadcast}, @IFA_FLAGS={0x8, 0x8, 0x400}]}, 0x30}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wg1\x00', r1}) sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x188001}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x98, 0x0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x81}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r2}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}]}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xb8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @private=0xa010101}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}]}, 0x98}, 0x1, 0x0, 0x0, 0x4000004}, 0x8000) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) signalfd(r0, &(0x7f0000000000)={[0x22]}, 0x8) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) r5 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r6 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r6, 0x0) getsockopt$bt_BT_SNDMTU(r6, 0x112, 0xc, 0x0, 0x0) [ 1500.881267] RDX: 00007f80a04f1b0a RSI: 0000000000000002 RDI: 00007f80a04f1b00 [ 1500.888548] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 000000000000000a [ 1500.895832] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000006 [ 1500.903116] R13: 0000000000000c2b R14: 00000000004ce79f R15: 00007f80a04f26d4 13:26:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000040)={0x0, 0xfb, 0x64, 0x4, 0x2b, "7737424b98cf65be3ed50db994a2e971", "500e3bf43759c63182cef2f50bbe281a5f0dc6093bb5fbdcddae00ed7080fb12240d4313d677daf0f08aa1aaca6a52164f80900a0bd50602e8cbd408ee1be758da83413d39e5f7cf9a5e7710d71f42"}, 0x64, 0x1) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) 13:26:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5433, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:52 executing program 1 (fault-call:4 fault-nth:7): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0']) 13:26:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid', @ANYRESHEX]) 13:26:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$bt_rfcomm(0x1f, 0x3, 0x3) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0xf402000000000000, 0x40, &(0x7f0000000940)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x98, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@loopback, @loopback, 0x0, 0x0, 'xfrm0\x00', 'geneve1\x00', {0xff}, {}, 0x62, 0x2, 0x28}, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x2}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x1, 0x5, 0x1, 0x3, 0x0, 0x4], 0x5, 0x5}, {0x4, [0x1, 0xe, 0x1, 0xa, 0x5, 0x5], 0x2, 0x6}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r2 = socket$inet_tcp(0x2, 0x1, 0x0) poll(&(0x7f0000000080)=[{}, {0xffffffffffffffff, 0x2027}, {r2, 0x14}, {r0, 0x700c}], 0x4, 0x102) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) getsockopt$ARPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x63, &(0x7f0000000100)={'HL\x00'}, &(0x7f0000000040)=0xfffffef7) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000002b00)=ANY=[@ANYBLOB="0010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000004f40000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000eaffffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000faffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008b29ac4108376c1af4471f5e5390c56b212c2ff06f6dcf67bfc1c6bb200000000000000000000000000110f6db03ff4f185077490e1e8ab6440769b9777e500756582f1c7f060b62b2fc1ebbab25a1aab8c5d5c9fd243f5efe44d80ce46cb3f86a5d46c3214c779fa45dfa0ec7a1adf1c7f9a6357f2185d4c15e3ea17c872f0a79ad8b2e6ef47a42c66a3b6745cbf0b8c99c9a08a3e25605963640369042498e9141715fc2b2fb1db62fc5ce257d478eb944bf622162081ccdfcaf913f6256ecf356b362d5b659211f9aad135b523d477fd355d6d094affe92f0dd697f8f6913c246b95389f8fba755b1cb4af58272a0ba847124f0df1be717099b7afbcba101dcac14516494d89f182c5d16fa75a6da1b861e20e5b39ea7b19a5d4a4bda22e55883ef5b899ae6beb94938be9c404268e5a02a9fc869424c452bf88cad2b60b3872b9542d6db6e6d43eda1d673c029dba4"]) r4 = socket$inet6(0xa, 0x3, 0x3a) r5 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(0xffffffffffffffff, 0x4610, &(0x7f00000000c0)={0x2e, 0x1}) sendfile(r4, r5, 0x0, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r5, 0x89e4) 13:26:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f0000000240)={0x0, 0xf, &(0x7f0000000300)={&(0x7f0000000100)={0x28, r4, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x4}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}]}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_NODE_GET(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x40, r4, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x18, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80}]}, @TIPC_NLA_MEDIA={0x14, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x20004805) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r6, 0x112, 0xc, 0x0, 0x0) 13:26:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5434, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000000)=""/44, &(0x7f0000000040)=0x2c) r3 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r3, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r4, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="98f60000", @ANYRES16=r5, @ANYBLOB="00022abd7000ffdbdf2508000000080004001f00000008000500050000006c00038008000300010000001400020073797a6b616c6c657231000000000000060007004e200000060004000400000008000300020000000600040002000000060007004e24000006000400010400000800010001000000140002006261746164765f736c6176655f3000000800060007000000"], 0x98}, 0x1, 0x0, 0x0, 0x5}, 0x24000001) sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="a879ed0012dc77f5ddccf7d18e2127344c13a34b7e0a3d60209fe432c79aa2a7dd2a6578f9aafae719952e4b264e4000000004b13b96cdbdc67cec2244cf97f32374d7c1abc5f66f55106c392cda0596ff42893ca3eb020c48619bf0284c6cd5017a658b356da8181001efd8c9568967a5c7eaee6fbbde714cd2f9deb7f02f6933b37f8633dea77c0bb7f16c8bf7c3ecc9b616f61d6b2e4f4ac4ddb956332b9d07c9403b0a99078392", @ANYRES16=r5, @ANYBLOB="20002cbd7000fedbdf25090000005c000380060004001f00000005000800020000000800010000000000140006002001000000000000000000000000000105000800040000000800030000000000080003000300000014000600fe8000000000000000000000000000aa08000400070000000800050001000000200003801400020064756d6d79300000000000000000000008000500ac14141108000600fd1f0000"], 0xa8}, 0x1, 0x0, 0x0, 0x40040005}, 0x80) r6 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r6, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r7, 0xc0502100, &(0x7f0000000080)) ptrace$pokeuser(0x6, 0x0, 0x9246, 0x0) socket$inet6(0xa, 0x3, 0x3a) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r8, 0x112, 0xc, 0x0, 0x0) [ 1501.205805] FAULT_INJECTION: forcing a failure. [ 1501.205805] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1501.217660] CPU: 0 PID: 24568 Comm: syz-executor.1 Not tainted 4.19.130-syzkaller #0 [ 1501.225551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1501.234913] Call Trace: [ 1501.237524] dump_stack+0x1fc/0x2fe [ 1501.241183] should_fail.cold+0xa/0x14 [ 1501.241777] IPVS: length: 44 != 8 [ 1501.245091] ? setup_fault_attr+0x200/0x200 [ 1501.245116] __alloc_pages_nodemask+0x239/0x2890 [ 1501.245135] ? avc_has_perm+0x227/0x410 [ 1501.245155] ? __lock_acquire+0x6de/0x3ff0 [ 1501.245174] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1501.245189] ? current_time+0x6f/0x1c0 [ 1501.245210] ? shmem_setattr+0x2d0/0xc90 [ 1501.245221] ? timespec64_trunc+0xf2/0x190 [ 1501.245232] ? inode_init_owner+0x330/0x330 [ 1501.245249] ? fsnotify+0x706/0xe20 [ 1501.245272] cache_grow_begin+0xa4/0x8a0 [ 1501.245289] ? setup_fault_attr+0x200/0x200 [ 1501.272516] IPVS: length: 44 != 422621984 13:26:52 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x1, 0x0) r4 = socket$key(0xf, 0x3, 0x2) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000600)=ANY=[@ANYBLOB="020300090c0000000400ffffffffffff0200130002000000000000b210d99400030006000000000002004e20e0000001010000000000000002000100f8beffff0000000200010000030005000000000002004e20e0"], 0x60}}, 0x0) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r3, 0x40045542, &(0x7f0000000080)=0x1ffc0) setsockopt$IPT_SO_SET_REPLACE(r7, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r8 = dup2(r3, r7) setsockopt$netlink_NETLINK_NO_ENOBUFS(r8, 0x10e, 0x5, &(0x7f0000000040)=0x10001, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) [ 1501.274685] ? lock_acquire+0x170/0x3c0 [ 1501.274706] cache_alloc_refill+0x273/0x340 [ 1501.274730] kmem_cache_alloc+0x346/0x370 [ 1501.274748] getname_flags+0xce/0x590 [ 1501.274771] do_sys_open+0x26c/0x520 [ 1501.323364] ? filp_open+0x70/0x70 [ 1501.326915] ? check_preemption_disabled+0x41/0x280 [ 1501.328363] hfs: invalid gid -1 [ 1501.331951] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1501.331966] ? trace_hardirqs_off_caller+0x69/0x210 [ 1501.331985] ? do_syscall_64+0x21/0x620 [ 1501.339783] hfs: unable to parse mount options [ 1501.340001] do_syscall_64+0xf9/0x620 [ 1501.357324] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1501.362523] RIP: 0033:0x416911 [ 1501.365733] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1501.384645] RSP: 002b:00007f80a04f1a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1501.392368] RAX: ffffffffffffffda RBX: 000000000050a0c0 RCX: 0000000000416911 [ 1501.399650] RDX: 00007f80a04f1b0a RSI: 0000000000000002 RDI: 00007f80a04f1b00 [ 1501.406928] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 000000000000000a [ 1501.414207] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000006 [ 1501.421482] R13: 0000000000000c2b R14: 00000000004ce79f R15: 00007f80a04f26d4 13:26:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r5, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/bus\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) r7 = socket$inet6(0xa, 0xa, 0x3a) r8 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r7, r8, 0x0, 0x0) ioctl$TUNGETSNDBUF(r8, 0x800454d3, &(0x7f0000000100)) chown(&(0x7f0000000000)='./file0\x00', r5, r6) [ 1501.495014] hfs: can't find a HFS filesystem on dev loop1 [ 1501.541440] QAT: Invalid ioctl [ 1501.566042] QAT: Invalid ioctl 13:26:53 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX]) 13:26:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid', @ANYRESHEX]) 13:26:53 executing program 1 (fault-call:4 fault-nth:8): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0']) 13:26:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5435, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) [ 1501.681857] QAT: Invalid ioctl [ 1501.687513] QAT: Invalid ioctl 13:26:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3a) r2 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000080)={0x7}, 0x4) r3 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000040)) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r6 = fcntl$dupfd(r0, 0x605, r5) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f00000000c0)={0x7, 0x9, {0x53, 0x1, 0x120, {0x6, 0x254}, {0x5, 0x6}, @const={0x5, {0xe95, 0x7fff, 0x642e, 0x4}}}, {0x51, 0x100, 0xfffd, {0x3, 0xbd74}, {0x9}, @rumble={0xf474, 0x1}}}) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r3, 0xc034564b, &(0x7f0000000000)={0x40, 0x0, 0x80, 0x8, 0x1, @stepwise={{0x401}, {0xad00, 0xae}, {0x400, 0x401}}}) getsockopt$bt_BT_SNDMTU(r4, 0x112, 0xc, 0x0, 0x0) [ 1501.787376] FAULT_INJECTION: forcing a failure. [ 1501.787376] name failslab, interval 1, probability 0, space 0, times 0 [ 1501.801913] CPU: 1 PID: 24624 Comm: syz-executor.1 Not tainted 4.19.130-syzkaller #0 [ 1501.809865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1501.819226] Call Trace: [ 1501.821841] dump_stack+0x1fc/0x2fe [ 1501.825494] should_fail.cold+0xa/0x14 [ 1501.829402] ? setup_fault_attr+0x200/0x200 [ 1501.833736] ? lock_acquire+0x170/0x3c0 [ 1501.837724] __should_failslab+0x115/0x180 [ 1501.841972] should_failslab+0x5/0xf [ 1501.845695] kmem_cache_alloc+0x277/0x370 [ 1501.849853] __alloc_file+0x21/0x330 [ 1501.853572] alloc_empty_file+0x6d/0x170 [ 1501.857637] path_openat+0xe9/0x2df0 [ 1501.861356] ? __lock_acquire+0x6de/0x3ff0 [ 1501.865602] ? current_time+0x6f/0x1c0 [ 1501.869500] ? path_lookupat+0x8d0/0x8d0 [ 1501.873572] ? mark_held_locks+0xf0/0xf0 [ 1501.877641] ? shmem_setattr+0x2d0/0xc90 [ 1501.881717] do_filp_open+0x18c/0x3f0 [ 1501.885520] ? may_open_dev+0xf0/0xf0 [ 1501.889329] ? __alloc_fd+0x28d/0x570 [ 1501.893141] ? lock_downgrade+0x720/0x720 [ 1501.897294] ? lock_acquire+0x170/0x3c0 [ 1501.901284] ? __alloc_fd+0x34/0x570 [ 1501.905013] ? do_raw_spin_unlock+0x171/0x230 [ 1501.909516] ? _raw_spin_unlock+0x29/0x40 [ 1501.913667] ? __alloc_fd+0x28d/0x570 [ 1501.917484] do_sys_open+0x3b3/0x520 [ 1501.921205] ? filp_open+0x70/0x70 [ 1501.924749] ? check_preemption_disabled+0x41/0x280 [ 1501.929790] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1501.934555] ? trace_hardirqs_off_caller+0x69/0x210 [ 1501.939581] ? do_syscall_64+0x21/0x620 [ 1501.943575] do_syscall_64+0xf9/0x620 [ 1501.947391] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1501.952587] RIP: 0033:0x416911 [ 1501.955787] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1501.974882] RSP: 002b:00007f80a04f1a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 13:26:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5437, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="bd60e739f4d6cd5b115d198b288a80566dd5ec22b40d4897917e507dda66ed77d803e897be1f34daab0fe373ab812bc705f9697ac9fac062363e13c1fad87d42b8cfda9e476e23c89b881f3d7cb41e0d05a5a9314a5cf29b3e9aff7247d52a2fb7624ebb5127731a6cdb396baa83ceef09680b867ae9aebad90b0318c2529d9f599cbc4aeb4fb1afeb7f23dfd90ef069e21375b2a795cb83db5f4dea5f0f985e", 0xa0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x400201, 0x0) ioctl$KVM_GET_DIRTY_LOG(r3, 0x4010ae42, &(0x7f0000000100)={0x101fc, 0x0, &(0x7f0000ffc000/0x2000)=nil}) 13:26:53 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) read$dsp(r0, &(0x7f0000000000)=""/157, 0x9d) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, 0x0, 0x0) [ 1501.982605] RAX: ffffffffffffffda RBX: 000000000050a0c0 RCX: 0000000000416911 [ 1501.989889] RDX: 00007f80a04f1b0a RSI: 0000000000000002 RDI: 00007f80a04f1b00 [ 1501.997170] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 000000000000000a [ 1502.004448] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000006 [ 1502.011726] R13: 0000000000000c2b R14: 00000000004ce79f R15: 00007f80a04f26d4 13:26:53 executing program 1 (fault-call:4 fault-nth:9): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0']) [ 1502.099862] hfs: invalid gid -1 [ 1502.103182] hfs: unable to parse mount options 13:26:53 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x1, 0x0) r4 = socket$key(0xf, 0x3, 0x2) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000600)=ANY=[@ANYBLOB="020300090c0000000400ffffffffffff0200130002000000000000b210d99400030006000000000002004e20e0000001010000000000000002000100f8beffff0000000200010000030005000000000002004e20e0"], 0x60}}, 0x0) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r3, 0x40045542, &(0x7f0000000080)=0x1ffc0) setsockopt$IPT_SO_SET_REPLACE(r7, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r8 = dup2(r3, r7) setsockopt$netlink_NETLINK_NO_ENOBUFS(r8, 0x10e, 0x5, &(0x7f0000000040)=0x10001, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) 13:26:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000000)) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, 0x0, 0x0) 13:26:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5441, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) [ 1502.295493] FAULT_INJECTION: forcing a failure. [ 1502.295493] name failslab, interval 1, probability 0, space 0, times 0 [ 1502.323011] QAT: Invalid ioctl [ 1502.337666] QAT: Invalid ioctl 13:26:53 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX]) [ 1502.346051] CPU: 0 PID: 24651 Comm: syz-executor.1 Not tainted 4.19.130-syzkaller #0 [ 1502.353963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1502.363345] Call Trace: [ 1502.365966] dump_stack+0x1fc/0x2fe [ 1502.367346] ttyprintk ttyprintk: tty_port_close_start: tty->count = 1 port count = 4 [ 1502.369603] should_fail.cold+0xa/0x14 [ 1502.369618] ? setup_fault_attr+0x200/0x200 [ 1502.369633] ? lock_acquire+0x170/0x3c0 [ 1502.369650] __should_failslab+0x115/0x180 [ 1502.369663] should_failslab+0x5/0xf [ 1502.369674] kmem_cache_alloc+0x277/0x370 [ 1502.369687] selinux_file_alloc_security+0xaf/0x190 [ 1502.369698] security_file_alloc+0x40/0x90 [ 1502.369708] __alloc_file+0xc9/0x330 [ 1502.369718] alloc_empty_file+0x6d/0x170 [ 1502.369729] path_openat+0xe9/0x2df0 [ 1502.369741] ? __lock_acquire+0x6de/0x3ff0 [ 1502.369753] ? current_time+0x6f/0x1c0 [ 1502.369763] ? path_lookupat+0x8d0/0x8d0 [ 1502.369774] ? mark_held_locks+0xf0/0xf0 [ 1502.369787] ? shmem_setattr+0x2d0/0xc90 [ 1502.369800] do_filp_open+0x18c/0x3f0 [ 1502.369809] ? may_open_dev+0xf0/0xf0 [ 1502.369820] ? __alloc_fd+0x28d/0x570 [ 1502.369833] ? lock_downgrade+0x720/0x720 [ 1502.369843] ? lock_acquire+0x170/0x3c0 [ 1502.369852] ? __alloc_fd+0x34/0x570 [ 1502.369864] ? do_raw_spin_unlock+0x171/0x230 [ 1502.369873] ? _raw_spin_unlock+0x29/0x40 [ 1502.369883] ? __alloc_fd+0x28d/0x570 [ 1502.369896] do_sys_open+0x3b3/0x520 [ 1502.369907] ? filp_open+0x70/0x70 [ 1502.369917] ? check_preemption_disabled+0x41/0x280 [ 1502.369928] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1502.369938] ? trace_hardirqs_off_caller+0x69/0x210 [ 1502.369949] ? do_syscall_64+0x21/0x620 [ 1502.369960] do_syscall_64+0xf9/0x620 [ 1502.369972] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1502.369981] RIP: 0033:0x416911 [ 1502.369993] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1502.369998] RSP: 002b:00007f80a0512a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1502.370008] RAX: ffffffffffffffda RBX: 000000000050a0c0 RCX: 0000000000416911 [ 1502.370015] RDX: 00007f80a0512b0a RSI: 0000000000000002 RDI: 00007f80a0512b00 [ 1502.370020] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1502.370026] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1502.370032] R13: 0000000000000c2b R14: 00000000004ce79f R15: 00007f80a05136d4 [ 1502.581367] [ 1502.581373] ====================================================== [ 1502.581377] WARNING: possible circular locking dependency detected [ 1502.581380] 4.19.130-syzkaller #0 Not tainted [ 1502.581385] ------------------------------------------------------ [ 1502.581389] syz-executor.5/24663 is trying to acquire lock: [ 1502.581392] 00000000c8527495 (console_owner){-...}, at: vprintk_emit+0x3e5/0x730 [ 1502.581403] [ 1502.581406] but task is already holding lock: [ 1502.581408] 000000006c73f501 (&(&port->lock)->rlock){-.-.}, at: tty_port_close_start.part.0+0x28/0x540 [ 1502.581420] [ 1502.581424] which lock already depends on the new lock. [ 1502.581426] [ 1502.581428] [ 1502.581433] the existing dependency chain (in reverse order) is: [ 1502.581434] [ 1502.581436] -> #2 (&(&port->lock)->rlock){-.-.}: [ 1502.581447] tty_port_tty_get+0x1d/0x80 [ 1502.581451] tty_port_default_wakeup+0x11/0x40 [ 1502.581454] serial8250_tx_chars+0x490/0xaf0 [ 1502.581458] serial8250_handle_irq.part.0+0x24b/0x290 [ 1502.581462] serial8250_default_handle_irq+0xae/0x220 [ 1502.581465] serial8250_interrupt+0xf2/0x1d0 [ 1502.581469] __handle_irq_event_percpu+0x27e/0x8e0 [ 1502.581472] handle_irq_event+0x102/0x285 [ 1502.581475] handle_edge_irq+0x260/0xcf0 [ 1502.581478] handle_irq+0x35/0x50 [ 1502.581481] do_IRQ+0x93/0x1c0 [ 1502.581484] ret_from_intr+0x0/0x1e [ 1502.581488] native_safe_halt+0xe/0x10 [ 1502.581491] default_idle+0x49/0x310 [ 1502.581493] do_idle+0x2ec/0x4b0 [ 1502.581496] cpu_startup_entry+0xc5/0xe0 [ 1502.581499] start_secondary+0x41f/0x580 [ 1502.581502] secondary_startup_64+0xa4/0xb0 [ 1502.581504] [ 1502.581506] -> #1 (&port_lock_key){-.-.}: [ 1502.581517] serial8250_console_write+0x89b/0xad0 [ 1502.581520] console_unlock+0xbb6/0x1110 [ 1502.581524] vprintk_emit+0x2b8/0x730 [ 1502.581527] vprintk_func+0x79/0x17e [ 1502.581530] printk+0xba/0xed [ 1502.581533] register_console+0x87f/0xc90 [ 1502.581536] univ8250_console_init+0x3a/0x46 [ 1502.581540] console_init+0x4cb/0x718 [ 1502.581543] start_kernel+0x68b/0x916 [ 1502.581547] secondary_startup_64+0xa4/0xb0 [ 1502.581549] [ 1502.581550] -> #0 (console_owner){-...}: [ 1502.581561] vprintk_emit+0x422/0x730 [ 1502.581564] vprintk_func+0x79/0x17e [ 1502.581567] printk+0xba/0xed [ 1502.581571] tty_port_close_start.part.0+0x4f3/0x540 [ 1502.581575] tty_port_close+0x46/0x160 [ 1502.581578] tty_release+0x455/0xf60 [ 1502.581581] __fput+0x2ce/0x890 [ 1502.581584] task_work_run+0x148/0x1c0 [ 1502.581587] exit_to_usermode_loop+0x251/0x2a0 [ 1502.581591] do_syscall_64+0x538/0x620 [ 1502.581595] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1502.581597] [ 1502.581600] other info that might help us debug this: [ 1502.581602] [ 1502.581605] Chain exists of: [ 1502.581606] console_owner --> &port_lock_key --> &(&port->lock)->rlock [ 1502.581621] [ 1502.581624] Possible unsafe locking scenario: [ 1502.581626] [ 1502.581630] CPU0 CPU1 [ 1502.581633] ---- ---- [ 1502.581635] lock(&(&port->lock)->rlock); [ 1502.581642] lock(&port_lock_key); [ 1502.581649] lock(&(&port->lock)->rlock); [ 1502.581655] lock(console_owner); [ 1502.581661] [ 1502.581663] *** DEADLOCK *** [ 1502.581665] [ 1502.581669] 2 locks held by syz-executor.5/24663: [ 1502.581671] #0: 00000000c470f14a (&tty->legacy_mutex){+.+.}, at: tty_lock+0x6a/0xa0 [ 1502.581684] #1: 000000006c73f501 (&(&port->lock)->rlock){-.-.}, at: tty_port_close_start.part.0+0x28/0x540 [ 1502.581698] [ 1502.581701] stack backtrace: [ 1502.581705] CPU: 1 PID: 24663 Comm: syz-executor.5 Not tainted 4.19.130-syzkaller #0 [ 1502.581711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1502.581713] Call Trace: [ 1502.581716] dump_stack+0x1fc/0x2fe [ 1502.581720] print_circular_bug.constprop.0.cold+0x2d7/0x41e [ 1502.581723] __lock_acquire+0x30c9/0x3ff0 [ 1502.581726] ? mark_held_locks+0xf0/0xf0 [ 1502.581730] ? memcpy+0x35/0x50 [ 1502.581733] ? vprintk_emit+0x3fd/0x730 [ 1502.581737] lock_acquire+0x170/0x3c0 [ 1502.581740] ? vprintk_emit+0x3e5/0x730 [ 1502.581744] vprintk_emit+0x422/0x730 [ 1502.581746] ? vprintk_emit+0x3e5/0x730 [ 1502.581749] vprintk_func+0x79/0x17e [ 1502.581752] printk+0xba/0xed [ 1502.581755] ? log_store.cold+0x16/0x16 [ 1502.581758] ? lock_acquire+0x170/0x3c0 [ 1502.581761] ? tty_port_close_start.part.0+0x28/0x540 [ 1502.581766] tty_port_close_start.part.0+0x4f3/0x540 [ 1502.581769] tty_port_close+0x46/0x160 [ 1502.581772] ? tpk_open+0x60/0x60 [ 1502.581775] tty_release+0x455/0xf60 [ 1502.581778] ? do_tty_hangup+0x30/0x30 [ 1502.581781] __fput+0x2ce/0x890 [ 1502.581784] task_work_run+0x148/0x1c0 [ 1502.581788] exit_to_usermode_loop+0x251/0x2a0 [ 1502.581791] do_syscall_64+0x538/0x620 [ 1502.581795] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1502.581798] RIP: 0033:0x416711 [ 1502.581809] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1502.581813] RSP: 002b:00007ffeb9bc90f0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1502.581822] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000416711 13:26:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r3 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r3, 0x0) ioctl$GIO_CMAP(r3, 0x4b70, &(0x7f0000000000)) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) 13:26:54 executing program 1 (fault-call:4 fault-nth:10): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0']) [ 1502.581826] RDX: 0000000000000000 RSI: 0000000000000c51 RDI: 0000000000000004 [ 1502.581831] RBP: 0000000000000001 R08: 00000000f580ec54 R09: 0000000000000000 [ 1502.581835] R10: 00007ffeb9bc91e0 R11: 0000000000000293 R12: 00000000007903c8 [ 1502.581840] R13: 000000000016ed40 R14: ffffffffffffffff R15: 000000000078bf0c 13:26:54 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x1, 0x0) r4 = socket$key(0xf, 0x3, 0x2) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000600)=ANY=[@ANYBLOB="020300090c0000000400ffffffffffff0200130002000000000000b210d99400030006000000000002004e20e0000001010000000000000002000100f8beffff0000000200010000030005000000000002004e20e0"], 0x60}}, 0x0) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r3, 0x40045542, &(0x7f0000000080)=0x1ffc0) setsockopt$IPT_SO_SET_REPLACE(r7, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r8 = dup2(r3, r7) setsockopt$netlink_NETLINK_NO_ENOBUFS(r8, 0x10e, 0x5, &(0x7f0000000040)=0x10001, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) 13:26:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x400041, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(r2, 0x3b71, &(0x7f0000000040)={0x20, 0x3, 0x100000000, 0x7fff, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000000c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTALL(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x40, r3, 0x10, 0x70bd2c, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @ipv4={[], [], @multicast2}}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x44000}, 0x8000) 13:26:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5450, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) [ 1503.293317] QAT: Invalid ioctl [ 1503.310002] QAT: Invalid ioctl [ 1503.364054] FAULT_INJECTION: forcing a failure. [ 1503.364054] name failslab, interval 1, probability 0, space 0, times 0 [ 1503.390058] CPU: 0 PID: 24685 Comm: syz-executor.1 Not tainted 4.19.130-syzkaller #0 [ 1503.397985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1503.407352] Call Trace: [ 1503.409961] dump_stack+0x1fc/0x2fe [ 1503.413608] should_fail.cold+0xa/0x14 [ 1503.417513] ? setup_fault_attr+0x200/0x200 [ 1503.421845] ? lock_acquire+0x170/0x3c0 [ 1503.425829] ? lock_downgrade+0x720/0x720 [ 1503.429988] __should_failslab+0x115/0x180 [ 1503.434233] should_failslab+0x5/0xf [ 1503.437954] kmem_cache_alloc_trace+0x284/0x380 [ 1503.442634] ? loop_info64_to_compat+0x5e0/0x5e0 [ 1503.447394] __kthread_create_on_node+0xd2/0x410 [ 1503.452157] ? kthread_parkme+0xa0/0xa0 [ 1503.456136] ? lo_ioctl+0x1bb/0x20e0 [ 1503.459857] ? __mutex_lock+0x3a8/0x1260 [ 1503.463922] ? lock_downgrade+0x720/0x720 [ 1503.468074] ? __fget+0x94/0x510 [ 1503.471448] ? loop_info64_to_compat+0x5e0/0x5e0 [ 1503.476210] kthread_create_on_node+0xbb/0xf0 [ 1503.480712] ? __kthread_create_on_node+0x410/0x410 [ 1503.485732] ? __fget+0x356/0x510 [ 1503.489189] ? do_dup2+0x450/0x450 [ 1503.492732] ? __lockdep_init_map+0x100/0x5a0 [ 1503.497233] ? __lockdep_init_map+0x100/0x5a0 [ 1503.501748] lo_ioctl+0xae5/0x20e0 [ 1503.505298] ? __kasan_slab_free+0x186/0x1f0 [ 1503.509712] ? loop_set_status64+0x110/0x110 [ 1503.514169] blkdev_ioctl+0x5cb/0x1a7e [ 1503.518065] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1503.523519] ? blkpg_ioctl+0x9d0/0x9d0 [ 1503.527424] ? mark_held_locks+0xf0/0xf0 [ 1503.531488] ? mark_held_locks+0xf0/0xf0 [ 1503.535564] ? timespec64_trunc+0xf2/0x190 [ 1503.539810] ? mark_held_locks+0xf0/0xf0 [ 1503.543881] ? lock_downgrade+0x720/0x720 [ 1503.548032] block_ioctl+0xe9/0x130 [ 1503.551663] ? blkdev_fallocate+0x3f0/0x3f0 [ 1503.555991] do_vfs_ioctl+0xcdb/0x12e0 [ 1503.559887] ? selinux_file_ioctl+0x506/0x6c0 [ 1503.564382] ? ioctl_preallocate+0x200/0x200 [ 1503.568792] ? selinux_inode_link+0x20/0x20 [ 1503.573116] ? __fget+0x356/0x510 [ 1503.576571] ? do_dup2+0x450/0x450 [ 1503.580121] ksys_ioctl+0x9b/0xc0 [ 1503.583579] __x64_sys_ioctl+0x6f/0xb0 [ 1503.587471] do_syscall_64+0xf9/0x620 [ 1503.591279] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1503.596466] RIP: 0033:0x45c9e7 13:26:55 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x1, 0x0) r4 = socket$key(0xf, 0x3, 0x2) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000600)=ANY=[@ANYBLOB="020300090c0000000400ffffffffffff0200130002000000000000b210d99400030006000000000002004e20e0000001010000000000000002000100f8beffff0000000200010000030005000000000002004e20e0"], 0x60}}, 0x0) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r3, 0x40045542, &(0x7f0000000080)=0x1ffc0) setsockopt$IPT_SO_SET_REPLACE(r7, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r8 = dup2(r3, r7) setsockopt$netlink_NETLINK_NO_ENOBUFS(r8, 0x10e, 0x5, &(0x7f0000000040)=0x10001, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) 13:26:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x1, 0xc4c0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r2, 0xc040563e, &(0x7f0000000040)={0x0, 0x0, 0x101, 0x6, {0x9, 0xbc5d, 0x7, 0x7}}) r3 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r3, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000100)={0x84, @multicast1, 0x4e20, 0x0, 'ovf\x00', 0x4, 0x0, 0xb}, 0x2c) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r3, 0xc01064bd, &(0x7f00000000c0)={&(0x7f0000000080)="023443be5a712fa40a2c56a874608e031f7938049f4de0e4207917327ef5b43e9c257eb7e63e7fd010d199c64ae1321234c464", 0x33, 0x0}) r6 = socket$inet6(0xa, 0x3, 0x3a) r7 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_DESTROYPROPBLOB(r7, 0xc00464be, &(0x7f0000000140)={r5}) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r8, 0x112, 0xc, 0x0, 0x0) 13:26:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f0000000000)=0x7ff) [ 1503.599664] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1503.618670] RSP: 002b:00007f80a04f1a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1503.626387] RAX: ffffffffffffffda RBX: 000000000050a0c0 RCX: 000000000045c9e7 [ 1503.633656] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1503.640919] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 000000000000000a [ 1503.648170] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1503.655422] R13: 0000000000000c2b R14: 00000000004ce79f R15: 00007f80a04f26d4 13:26:55 executing program 1 (fault-call:4 fault-nth:11): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0']) [ 1503.724647] hfs: invalid gid -1 [ 1503.727962] hfs: unable to parse mount options 13:26:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5451, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) [ 1503.781916] QAT: Invalid ioctl [ 1503.808438] QAT: Invalid ioctl 13:26:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3a) r2 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) connect$llc(r2, &(0x7f0000000200)={0x1a, 0x10e, 0x40, 0x3f, 0x4, 0x0, @local}, 0x10) r3 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x50, &(0x7f0000000280), 0x4) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$CAN_RAW_FD_FRAMES(r3, 0x65, 0x5, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$bt_BT_SNDMTU(r4, 0x112, 0xc, 0x0, 0x0) r5 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) r6 = socket$inet6(0xa, 0x3, 0x3a) r7 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x0) r8 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000180)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) write$selinux_attr(r8, &(0x7f00000001c0)='system_u:object_r:setrans_var_run_t:s0\x00', 0x27) ioctl$vim2m_VIDIOC_STREAMON(r7, 0x40045612, &(0x7f0000000140)=0x6) fchmod(r5, 0x0) bind$unix(r5, &(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) 13:26:55 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x300, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX]) 13:26:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5452, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:55 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x1, 0x0) r4 = socket$key(0xf, 0x3, 0x2) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000600)=ANY=[@ANYBLOB="020300090c0000000400ffffffffffff0200130002000000000000b210d99400030006000000000002004e20e0000001010000000000000002000100f8beffff0000000200010000030005000000000002004e20e0"], 0x60}}, 0x0) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r3, 0x40045542, &(0x7f0000000080)=0x1ffc0) setsockopt$IPT_SO_SET_REPLACE(r7, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r8 = dup2(r3, r7) setsockopt$netlink_NETLINK_NO_ENOBUFS(r8, 0x10e, 0x5, &(0x7f0000000040)=0x10001, 0x4) 13:26:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x300, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r4 = socket(0xa, 0x1, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r4, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB="200000ede3000000840000000200"/28, @ANYRES32=r6], 0x20}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000080)={r6, @in6={{0xa, 0x4e23, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x100}}}, 0x84) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000040)=@assoc_value={r6, 0x4}, &(0x7f0000000080)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r7, 0x112, 0xc, 0x0, 0x0) [ 1503.923673] FAULT_INJECTION: forcing a failure. [ 1503.923673] name failslab, interval 1, probability 0, space 0, times 0 [ 1503.949152] audit: type=1800 audit(1593178015.587:137): pid=24730 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16994 res=0 [ 1503.956893] QAT: Invalid ioctl [ 1503.978994] CPU: 0 PID: 24711 Comm: syz-executor.1 Not tainted 4.19.130-syzkaller #0 [ 1503.986917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1503.996280] Call Trace: [ 1503.998886] dump_stack+0x1fc/0x2fe [ 1504.002529] should_fail.cold+0xa/0x14 [ 1504.006430] ? setup_fault_attr+0x200/0x200 [ 1504.010764] ? lock_acquire+0x170/0x3c0 [ 1504.014742] ? lock_downgrade+0x720/0x720 [ 1504.018895] __should_failslab+0x115/0x180 [ 1504.023137] should_failslab+0x5/0xf [ 1504.026856] kmem_cache_alloc+0x277/0x370 [ 1504.031013] __kernfs_new_node+0xd2/0x680 [ 1504.035175] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1504.039935] ? kernfs_activate+0x2c/0x1d0 [ 1504.044091] ? lock_downgrade+0x720/0x720 [ 1504.048255] ? kernfs_add_one+0x51/0x4c0 [ 1504.052325] ? __mutex_add_waiter+0x160/0x160 [ 1504.056828] ? __mutex_unlock_slowpath+0xea/0x610 [ 1504.061677] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1504.066441] kernfs_new_node+0x92/0x120 [ 1504.070425] __kernfs_create_file+0x51/0x33f [ 1504.074841] sysfs_add_file_mode_ns+0x226/0x540 [ 1504.079530] internal_create_group+0x355/0xb20 [ 1504.084119] ? sysfs_remove_link_from_group+0x70/0x70 [ 1504.089315] ? lock_downgrade+0x720/0x720 [ 1504.093471] lo_ioctl+0xf7c/0x20e0 [ 1504.097019] ? loop_set_status64+0x110/0x110 [ 1504.101430] blkdev_ioctl+0x5cb/0x1a7e [ 1504.105323] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1504.110688] ? blkpg_ioctl+0x9d0/0x9d0 [ 1504.114582] ? mark_held_locks+0xf0/0xf0 [ 1504.118755] ? mark_held_locks+0xf0/0xf0 [ 1504.122821] ? timespec64_trunc+0xf2/0x190 [ 1504.127060] ? mark_held_locks+0xf0/0xf0 [ 1504.131135] ? lock_downgrade+0x720/0x720 [ 1504.135285] block_ioctl+0xe9/0x130 [ 1504.138913] ? blkdev_fallocate+0x3f0/0x3f0 [ 1504.143237] do_vfs_ioctl+0xcdb/0x12e0 [ 1504.147129] ? selinux_file_ioctl+0x506/0x6c0 [ 1504.151631] ? ioctl_preallocate+0x200/0x200 [ 1504.156046] ? selinux_inode_link+0x20/0x20 [ 1504.160374] ? __fget+0x356/0x510 [ 1504.163830] ? do_dup2+0x450/0x450 [ 1504.167379] ksys_ioctl+0x9b/0xc0 [ 1504.170837] __x64_sys_ioctl+0x6f/0xb0 [ 1504.174728] do_syscall_64+0xf9/0x620 [ 1504.178533] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1504.183719] RIP: 0033:0x45c9e7 [ 1504.186910] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1504.205813] RSP: 002b:00007f80a0512a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1504.213527] RAX: ffffffffffffffda RBX: 000000000050a0c0 RCX: 000000000045c9e7 [ 1504.220803] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1504.228080] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1504.235354] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1504.242631] R13: 0000000000000c2b R14: 00000000004ce79f R15: 00007f80a05136d4 13:26:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5456, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:55 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x1, 0x0) r4 = socket$key(0xf, 0x3, 0x2) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000600)=ANY=[@ANYBLOB="020300090c0000000400ffffffffffff0200130002000000000000b210d99400030006000000000002004e20e0000001010000000000000002000100f8beffff0000000200010000030005000000000002004e20e0"], 0x60}}, 0x0) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r3, 0x40045542, &(0x7f0000000080)=0x1ffc0) setsockopt$IPT_SO_SET_REPLACE(r7, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) dup2(r3, r7) [ 1504.424368] hfs: can't find a HFS filesystem on dev loop1 13:26:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5457, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:56 executing program 1 (fault-call:4 fault-nth:12): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0']) [ 1504.500668] QAT: Invalid ioctl 13:26:56 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x1, 0x0) r4 = socket$key(0xf, 0x3, 0x2) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000600)=ANY=[@ANYBLOB="020300090c0000000400ffffffffffff0200130002000000000000b210d99400030006000000000002004e20e0000001010000000000000002000100f8beffff0000000200010000030005000000000002004e20e0"], 0x60}}, 0x0) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r3, 0x40045542, &(0x7f0000000080)=0x1ffc0) setsockopt$IPT_SO_SET_REPLACE(r7, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) 13:26:56 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x480, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX]) 13:26:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x545d, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x5460, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) [ 1504.646597] QAT: Invalid ioctl [ 1504.656522] FAULT_INJECTION: forcing a failure. [ 1504.656522] name failslab, interval 1, probability 0, space 0, times 0 [ 1504.674503] CPU: 0 PID: 24760 Comm: syz-executor.1 Not tainted 4.19.130-syzkaller #0 [ 1504.682416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1504.691768] Call Trace: [ 1504.694375] dump_stack+0x1fc/0x2fe [ 1504.698016] should_fail.cold+0xa/0x14 [ 1504.701912] ? setup_fault_attr+0x200/0x200 [ 1504.706350] ? lock_acquire+0x170/0x3c0 [ 1504.710333] ? lock_downgrade+0x720/0x720 [ 1504.714487] __should_failslab+0x115/0x180 [ 1504.718729] should_failslab+0x5/0xf [ 1504.722450] kmem_cache_alloc+0x277/0x370 [ 1504.726603] __kernfs_new_node+0xd2/0x680 [ 1504.730761] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1504.735519] ? kernfs_activate+0x2c/0x1d0 [ 1504.739673] ? lock_downgrade+0x720/0x720 [ 1504.743825] ? kernfs_add_one+0x51/0x4c0 [ 1504.747894] ? __mutex_add_waiter+0x160/0x160 [ 1504.752397] ? __mutex_unlock_slowpath+0xea/0x610 [ 1504.757241] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1504.762008] kernfs_new_node+0x92/0x120 [ 1504.766000] __kernfs_create_file+0x51/0x33f [ 1504.770423] sysfs_add_file_mode_ns+0x226/0x540 [ 1504.775106] internal_create_group+0x355/0xb20 [ 1504.779699] ? sysfs_remove_link_from_group+0x70/0x70 [ 1504.784892] ? lock_downgrade+0x720/0x720 [ 1504.789058] lo_ioctl+0xf7c/0x20e0 [ 1504.792605] ? loop_set_status64+0x110/0x110 [ 1504.797032] blkdev_ioctl+0x5cb/0x1a7e [ 1504.800926] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1504.806296] ? blkpg_ioctl+0x9d0/0x9d0 [ 1504.810189] ? mark_held_locks+0xf0/0xf0 [ 1504.814257] ? mark_held_locks+0xf0/0xf0 [ 1504.818321] ? timespec64_trunc+0xf2/0x190 [ 1504.822568] ? mark_held_locks+0xf0/0xf0 [ 1504.826634] ? lock_downgrade+0x720/0x720 [ 1504.830787] block_ioctl+0xe9/0x130 [ 1504.834420] ? blkdev_fallocate+0x3f0/0x3f0 [ 1504.838748] do_vfs_ioctl+0xcdb/0x12e0 [ 1504.842642] ? selinux_file_ioctl+0x506/0x6c0 13:26:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = socket(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r2, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {}, 0x7fff}) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(0xffffffffffffffff, 0xc01064c7, &(0x7f00000003c0)={0x3, 0x0, &(0x7f0000000380)=[0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000400)={&(0x7f0000000280)=[0x2, 0x9, 0x7], 0x3, 0x800, r3, r2}) r4 = socket(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r4, 0x8983, &(0x7f0000000080)={0x0, 'vlan0\x00', {}, 0x7fff}) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(0xffffffffffffffff, 0xc01064c7, &(0x7f00000003c0)={0x3, 0x0, &(0x7f0000000380)=[0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000400)={&(0x7f0000000280)=[0x2, 0x9, 0x7], 0x3, 0x800, r5, r4}) r6 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r6, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r6, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x8000, 0x8040], 0x2, 0x80000, r5, r0}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) prctl$PR_SET_TSC(0x1a, 0x0) getsockopt$bt_BT_SNDMTU(r7, 0x112, 0xc, 0x0, 0x0) [ 1504.847141] ? ioctl_preallocate+0x200/0x200 [ 1504.851557] ? selinux_inode_link+0x20/0x20 [ 1504.855889] ? __fget+0x356/0x510 [ 1504.859341] ? do_dup2+0x450/0x450 [ 1504.862873] ksys_ioctl+0x9b/0xc0 [ 1504.866316] __x64_sys_ioctl+0x6f/0xb0 [ 1504.870199] do_syscall_64+0xf9/0x620 [ 1504.873995] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1504.879172] RIP: 0033:0x45c9e7 [ 1504.882353] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1504.901238] RSP: 002b:00007f80a0512a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1504.908931] RAX: ffffffffffffffda RBX: 000000000050a0c0 RCX: 000000000045c9e7 [ 1504.916180] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1504.923429] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1504.930681] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1504.937932] R13: 0000000000000c2b R14: 00000000004ce79f R15: 00007f80a05136d4 13:26:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0xac, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r5 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) symlinkat(&(0x7f0000000140)='./file0/bus\x00', r5, &(0x7f0000000180)='./file0/bus\x00') getsockopt$bt_BT_SNDMTU(r4, 0x112, 0xc, 0x0, 0x0) r6 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r6, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f00000000c0)={@empty, 0xffffff44, 0x2, 0x0, 0x4, 0x3, 0x80}, &(0x7f0000000100)=0x20) ioctl$SIOCPNDELRESOURCE(r1, 0x89ef, &(0x7f0000000000)=0x1) 13:26:56 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x1, 0x0) r4 = socket$key(0xf, 0x3, 0x2) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000600)=ANY=[@ANYBLOB="020300090c0000000400ffffffffffff0200130002000000000000b210d99400030006000000000002004e20e0000001010000000000000002000100f8beffff0000000200010000030005000000000002004e20e0"], 0x60}}, 0x0) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r3, 0x40045542, &(0x7f0000000080)=0x1ffc0) [ 1504.974343] hfs: can't find a HFS filesystem on dev loop1 13:26:56 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000080)='./file0/bus\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:setrans_initrc_exec_t:s0\x00', 0x2b, 0x3) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r3 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r3, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x220300, 0x0) r5 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r5, 0x0) ioctl$KDMKTONE(r5, 0x4b30, 0x0) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) write$P9_RATTACH(r3, &(0x7f0000000000)={0x14, 0x69, 0x2, {0x80, 0x3, 0x2}}, 0x14) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) 13:26:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x40049409, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$rds(r1, &(0x7f0000000000)={0x2, 0x4e20, @local}, 0x10) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)) r3 = socket$inet6(0xa, 0x3, 0x3a) r4 = open(&(0x7f0000000240)='./file0/bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r4, 0x80184153, &(0x7f0000001180)={0x0, &(0x7f0000001140)=[&(0x7f0000000080)="43dff871c050b3cb321802b090a76c0566b619452459f200283075647887899b130caa7d685db08195cd", &(0x7f00000000c0)="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", &(0x7f00000010c0)="c44eb0019c04a7cea2fb181b2c078beb5f2e8bcf7fd78c5ac8f3497ef40c49b63817eaffc10c87f50fb398cf74137ae1e904d426b746a5b4dba16bd4453556074b32d3c10415d2bd2cdf91f3319aa542ee7918cf63f65546f54c8759827002edb722ea0510510cc684ba496af0"]}) 13:26:56 executing program 1 (fault-call:4 fault-nth:13): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0']) [ 1505.101583] QAT: Invalid ioctl 13:26:56 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x500, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX]) 13:26:56 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x1, 0x0) r3 = socket$key(0xf, 0x3, 0x2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000600)=ANY=[@ANYBLOB="020300090c0000000400ffffffffffff0200130002000000000000b210d99400030006000000000002004e20e0000001010000000000000002000100f8beffff0000000200010000030005000000000002004e20e0"], 0x60}}, 0x0) sendmsg$key(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 13:26:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) 13:26:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fe) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) 13:26:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x40086602, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:56 executing program 2: r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r0, 0x0) ioctl$SIOCPNADDRESOURCE(r0, 0x89e0, &(0x7f0000000000)=0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, 0x0, 0x0) 13:26:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r3 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r3, 0x0) write$P9_RLOPEN(r3, &(0x7f0000000000)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x6}, 0x6}}, 0x18) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) 13:26:56 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x1, 0x0) r3 = socket$key(0xf, 0x3, 0x2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000600)=ANY=[@ANYBLOB="020300090c0000000400ffffffffffff0200130002000000000000b210d99400030006000000000002004e20e0000001010000000000000002000100f8beffff0000000200010000030005000000000002004e20e0"], 0x60}}, 0x0) sendmsg$key(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 1505.303186] FAULT_INJECTION: forcing a failure. [ 1505.303186] name failslab, interval 1, probability 0, space 0, times 0 [ 1505.316736] CPU: 1 PID: 24839 Comm: syz-executor.1 Not tainted 4.19.130-syzkaller #0 [ 1505.324620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1505.333961] Call Trace: [ 1505.336547] dump_stack+0x1fc/0x2fe [ 1505.340162] should_fail.cold+0xa/0x14 [ 1505.344035] ? setup_fault_attr+0x200/0x200 [ 1505.348345] ? lock_acquire+0x170/0x3c0 [ 1505.352301] ? lock_downgrade+0x720/0x720 [ 1505.356432] __should_failslab+0x115/0x180 [ 1505.360652] should_failslab+0x5/0xf [ 1505.364348] kmem_cache_alloc+0x277/0x370 [ 1505.368479] __kernfs_new_node+0xd2/0x680 [ 1505.372610] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1505.377352] ? __mutex_unlock_slowpath+0xea/0x610 [ 1505.382184] ? wait_for_completion_io+0x10/0x10 [ 1505.386834] ? kernfs_next_descendant_post+0x19c/0x290 [ 1505.392096] kernfs_new_node+0x92/0x120 [ 1505.396056] __kernfs_create_file+0x51/0x33f [ 1505.400449] sysfs_add_file_mode_ns+0x226/0x540 [ 1505.405107] internal_create_group+0x355/0xb20 [ 1505.409672] ? sysfs_remove_link_from_group+0x70/0x70 [ 1505.414845] ? lock_downgrade+0x720/0x720 [ 1505.418982] lo_ioctl+0xf7c/0x20e0 [ 1505.422520] ? loop_set_status64+0x110/0x110 [ 1505.426912] blkdev_ioctl+0x5cb/0x1a7e [ 1505.430793] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1505.436152] ? blkpg_ioctl+0x9d0/0x9d0 [ 1505.440026] ? mark_held_locks+0xf0/0xf0 [ 1505.444074] ? mark_held_locks+0xf0/0xf0 [ 1505.448118] ? timespec64_trunc+0xf2/0x190 [ 1505.452335] ? mark_held_locks+0xf0/0xf0 [ 1505.456396] ? lock_downgrade+0x720/0x720 [ 1505.460526] block_ioctl+0xe9/0x130 [ 1505.464134] ? blkdev_fallocate+0x3f0/0x3f0 [ 1505.468443] do_vfs_ioctl+0xcdb/0x12e0 [ 1505.472314] ? selinux_file_ioctl+0x506/0x6c0 [ 1505.476793] ? ioctl_preallocate+0x200/0x200 [ 1505.481181] ? selinux_inode_link+0x20/0x20 [ 1505.485485] ? __fget+0x356/0x510 [ 1505.488919] ? do_dup2+0x450/0x450 [ 1505.492444] ksys_ioctl+0x9b/0xc0 [ 1505.495879] __x64_sys_ioctl+0x6f/0xb0 [ 1505.499750] do_syscall_64+0xf9/0x620 [ 1505.503538] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1505.508716] RIP: 0033:0x45c9e7 [ 1505.511889] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1505.530773] RSP: 002b:00007f80a04f1a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1505.538461] RAX: ffffffffffffffda RBX: 000000000050a0c0 RCX: 000000000045c9e7 [ 1505.545711] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1505.552961] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 000000000000000a [ 1505.560255] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1505.567505] R13: 0000000000000c2b R14: 00000000004ce79f R15: 00007f80a04f26d4 [ 1505.603335] hfs: can't find a HFS filesystem on dev loop1 13:26:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ocfs2_control\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x20c, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000280)={0x13, 0x10, 0xfa00, {&(0x7f0000000000), r4, 0x2}}, 0x18) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) 13:26:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x40087602, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:57 executing program 1 (fault-call:4 fault-nth:14): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0']) 13:26:57 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x9) ioctl$SNDCTL_DSP_GETODELAY(0xffffffffffffffff, 0x80045017, &(0x7f0000000000)) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, 0x0, 0x0) 13:26:57 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x600, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX]) 13:26:57 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x1, 0x0) r3 = socket$key(0xf, 0x3, 0x2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$key(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 13:26:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) lseek(0xffffffffffffffff, 0xfffffffffffffff8, 0x2) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) 13:26:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x4020940d, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r3 = dup2(r2, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r4, 0x112, 0xc, 0x0, 0x0) 13:26:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f0000000000)={[0xf000, 0x3000, 0x2, 0x2], 0x81, 0x0, 0x7c1e5d79}) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x5) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, 0x0, 0x0) 13:26:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x402c542b, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) [ 1505.825422] FAULT_INJECTION: forcing a failure. [ 1505.825422] name failslab, interval 1, probability 0, space 0, times 0 [ 1505.849516] CPU: 1 PID: 24866 Comm: syz-executor.1 Not tainted 4.19.130-syzkaller #0 [ 1505.857542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1505.866894] Call Trace: [ 1505.869476] dump_stack+0x1fc/0x2fe [ 1505.873096] should_fail.cold+0xa/0x14 [ 1505.876970] ? setup_fault_attr+0x200/0x200 [ 1505.881274] ? lock_acquire+0x170/0x3c0 [ 1505.885229] ? lock_downgrade+0x720/0x720 [ 1505.889364] __should_failslab+0x115/0x180 [ 1505.893578] should_failslab+0x5/0xf [ 1505.897272] kmem_cache_alloc+0x277/0x370 [ 1505.901403] __kernfs_new_node+0xd2/0x680 [ 1505.905534] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1505.910271] ? __mutex_unlock_slowpath+0xea/0x610 [ 1505.915097] ? kernfs_add_one+0x51/0x4c0 [ 1505.919139] ? wait_for_completion_io+0x10/0x10 [ 1505.923788] ? kernfs_next_descendant_post+0x19c/0x290 [ 1505.929045] kernfs_new_node+0x92/0x120 [ 1505.932999] __kernfs_create_file+0x51/0x33f [ 1505.937391] sysfs_add_file_mode_ns+0x226/0x540 [ 1505.942042] internal_create_group+0x355/0xb20 [ 1505.946608] ? sysfs_remove_link_from_group+0x70/0x70 [ 1505.951779] ? lock_downgrade+0x720/0x720 [ 1505.955911] lo_ioctl+0xf7c/0x20e0 [ 1505.959432] ? loop_set_status64+0x110/0x110 [ 1505.963821] blkdev_ioctl+0x5cb/0x1a7e [ 1505.967692] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1505.973042] ? blkpg_ioctl+0x9d0/0x9d0 [ 1505.976927] ? mark_held_locks+0xf0/0xf0 [ 1505.980983] ? mark_held_locks+0xf0/0xf0 [ 1505.985036] ? timespec64_trunc+0xf2/0x190 [ 1505.989256] ? mark_held_locks+0xf0/0xf0 [ 1505.993301] ? lock_downgrade+0x720/0x720 [ 1505.997433] block_ioctl+0xe9/0x130 [ 1506.001042] ? blkdev_fallocate+0x3f0/0x3f0 [ 1506.005349] do_vfs_ioctl+0xcdb/0x12e0 [ 1506.009225] ? selinux_file_ioctl+0x506/0x6c0 [ 1506.013714] ? ioctl_preallocate+0x200/0x200 [ 1506.018104] ? selinux_inode_link+0x20/0x20 [ 1506.022528] ? __fget+0x356/0x510 [ 1506.025964] ? do_dup2+0x450/0x450 [ 1506.029491] ksys_ioctl+0x9b/0xc0 [ 1506.032929] __x64_sys_ioctl+0x6f/0xb0 [ 1506.036829] do_syscall_64+0xf9/0x620 [ 1506.040619] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1506.045798] RIP: 0033:0x45c9e7 [ 1506.048981] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1506.067872] RSP: 002b:00007f80a0512a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 13:26:57 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x1, 0x0) r3 = socket$key(0xf, 0x3, 0x2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$key(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 1506.075567] RAX: ffffffffffffffda RBX: 000000000050a0c0 RCX: 000000000045c9e7 [ 1506.082822] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1506.090086] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1506.097351] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1506.104604] R13: 0000000000000c2b R14: 00000000004ce79f R15: 00007f80a05136d4 13:26:57 executing program 1 (fault-call:4 fault-nth:15): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0']) [ 1506.129819] hfs: can't find a HFS filesystem on dev loop1 13:26:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x402c542c, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) 13:26:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) sync() prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) 13:26:57 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x3f00, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX]) 13:26:57 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x1, 0x0) r3 = socket$key(0xf, 0x3, 0x2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$key(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 13:26:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x80045432, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000000)={0x0, 0x9, 0x7fffffff, 0x4}) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) [ 1506.350628] FAULT_INJECTION: forcing a failure. [ 1506.350628] name failslab, interval 1, probability 0, space 0, times 0 [ 1506.362766] CPU: 0 PID: 24934 Comm: syz-executor.1 Not tainted 4.19.130-syzkaller #0 [ 1506.370663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1506.380015] Call Trace: [ 1506.382607] dump_stack+0x1fc/0x2fe [ 1506.386263] should_fail.cold+0xa/0x14 [ 1506.390182] ? setup_fault_attr+0x200/0x200 [ 1506.394508] ? lock_acquire+0x170/0x3c0 [ 1506.398492] ? lock_downgrade+0x720/0x720 [ 1506.402646] __should_failslab+0x115/0x180 [ 1506.406879] should_failslab+0x5/0xf [ 1506.410579] kmem_cache_alloc+0x277/0x370 [ 1506.414708] __kernfs_new_node+0xd2/0x680 [ 1506.418837] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1506.423579] ? __mutex_unlock_slowpath+0xea/0x610 [ 1506.428403] ? kernfs_add_one+0x51/0x4c0 [ 1506.432444] ? wait_for_completion_io+0x10/0x10 [ 1506.437092] ? kernfs_next_descendant_post+0x19c/0x290 [ 1506.442347] kernfs_new_node+0x92/0x120 [ 1506.446302] __kernfs_create_file+0x51/0x33f [ 1506.450688] sysfs_add_file_mode_ns+0x226/0x540 [ 1506.455340] internal_create_group+0x355/0xb20 [ 1506.459977] ? sysfs_remove_link_from_group+0x70/0x70 [ 1506.465151] ? lock_downgrade+0x720/0x720 [ 1506.469283] lo_ioctl+0xf7c/0x20e0 [ 1506.472801] ? loop_set_status64+0x110/0x110 [ 1506.477191] blkdev_ioctl+0x5cb/0x1a7e [ 1506.481058] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1506.486405] ? blkpg_ioctl+0x9d0/0x9d0 [ 1506.490284] ? mark_held_locks+0xf0/0xf0 [ 1506.494325] ? mark_held_locks+0xf0/0xf0 [ 1506.498367] ? timespec64_trunc+0xf2/0x190 [ 1506.502585] ? mark_held_locks+0xf0/0xf0 [ 1506.506627] ? lock_downgrade+0x720/0x720 [ 1506.510754] block_ioctl+0xe9/0x130 [ 1506.514362] ? blkdev_fallocate+0x3f0/0x3f0 [ 1506.518666] do_vfs_ioctl+0xcdb/0x12e0 [ 1506.522584] ? selinux_file_ioctl+0x506/0x6c0 [ 1506.527061] ? ioctl_preallocate+0x200/0x200 [ 1506.531449] ? selinux_inode_link+0x20/0x20 [ 1506.535754] ? __fget+0x356/0x510 [ 1506.539186] ? do_dup2+0x450/0x450 [ 1506.542709] ksys_ioctl+0x9b/0xc0 [ 1506.546144] __x64_sys_ioctl+0x6f/0xb0 [ 1506.550030] do_syscall_64+0xf9/0x620 [ 1506.553872] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1506.559046] RIP: 0033:0x45c9e7 [ 1506.562226] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1506.581114] RSP: 002b:00007f80a04f1a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1506.588803] RAX: ffffffffffffffda RBX: 000000000050a0c0 RCX: 000000000045c9e7 13:26:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) fchdir(r2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x9) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, 0x0, 0x0) 13:26:58 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x1, 0x0) r3 = socket$key(0xf, 0x3, 0x2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r4) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000600)=ANY=[@ANYBLOB="020300090c0000000400ffffffffffff0200130002000000000000b210d99400030006000000000002004e20e0000001010000000000000002000100f8beffff0000000200010000030005000000000002004e20e0"], 0x60}}, 0x0) sendmsg$key(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 13:26:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r3 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) r4 = socket$phonet(0x23, 0x2, 0x1) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r4, 0x8982, &(0x7f0000000180)={0x3, 'ip6gre0\x00', {0x40}, 0x5}) fchmod(r3, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r3, 0x8108551b, &(0x7f0000000000)={0x9, 0x2, "260baadcf767fe176e5f5dbf999c813d2c59ab2e5b432594cc1382e972568f278cdb76cb3b5cd3c8d5eb2107a5c2bd749a3e1a7ddf3ce5e7c0f3bd274553eb62268913ccbead629f4171a5ecd7f4618721f158aea40eb831e7d4694882022600775cc5849f483b35f542f3a2aa423e731324b1cd7884cae896562a025ea88070927b87b56b305142b1ad038db0705cca5e266864dadb6a8993f9396e2ec2edd4e6d4cf8a7f10203bee8065ff84969214362c7e1ac990dae1f0d167be3537d2ac8dc0dc6696528eacfd3f488feba93038327bd12a195ad834f8447b46586c81455ac4a15918e769fee9ab4449092c55ae291342c163f81e73c8707c4333a334ba"}) r5 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r5, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f0000000140)=0x4, 0x4) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) 13:26:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x80045440, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) [ 1506.596053] RDX: 0000000000000007 RSI: 0000000000004c00 RDI: 0000000000000008 [ 1506.603310] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 000000000000000a [ 1506.610559] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1506.617808] R13: 0000000000000c2b R14: 00000000004ce79f R15: 00007f80a04f26d4 [ 1506.640928] hfs: can't find a HFS filesystem on dev loop1 13:26:58 executing program 1 (fault-call:4 fault-nth:16): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0']) 13:26:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x80086601, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:58 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x1, 0x0) r3 = socket$key(0xf, 0x3, 0x2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r4) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000600)=ANY=[@ANYBLOB="020300090c0000000400ffffffffffff0200130002000000000000b210d99400030006000000000002004e20e0000001010000000000000002000100f8beffff0000000200010000030005000000000002004e20e0"], 0x60}}, 0x0) sendmsg$key(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 13:26:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x3) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0x0, 0x0) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000000)) 13:26:58 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0/bus\x00', 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='part=0x0000000000000401,quiet,gid=', @ANYRESHEX]) 13:26:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x80087601, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:58 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x1, 0x0) r3 = socket$key(0xf, 0x3, 0x2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r4) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000600)=ANY=[@ANYBLOB="020300090c0000000400ffffffffffff0200130002000000000000b210d99400030006000000000002004e20e0000001010000000000000002000100f8beffff0000000200010000030005000000000002004e20e0"], 0x60}}, 0x0) sendmsg$key(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 13:26:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400000, 0x0) ioctl$BLKRAGET(r2, 0x1263, &(0x7f0000000040)) r3 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fchmod(r3, 0x0) bind$isdn(r3, &(0x7f0000000080)={0x22, 0x1f, 0x7f, 0x7}, 0x6) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_SNDMTU(r4, 0x112, 0xc, 0x0, 0x0) 13:26:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0x802c542a, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) 13:26:58 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xf402000000000000, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x0, 0xf8, 0x0, 0x0, 0xf8, 0x190, 0x190, 0x190, 0x190, 0x190, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x1, 0x0) r3 = socket$key(0xf, 0x3, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000600)=ANY=[@ANYBLOB="020300090c0000000400ffffffffffff0200130002000000000000b210d99400030006000000000002004e20e0000001010000000000000002000100f8beffff0000000200010000030005000000000002004e20e0"], 0x60}}, 0x0) sendmsg$key(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 1506.922240] FAULT_INJECTION: forcing a failure. [ 1506.922240] name failslab, interval 1, probability 0, space 0, times 0 [ 1506.954257] CPU: 0 PID: 24989 Comm: syz-executor.1 Not tainted 4.19.130-syzkaller #0 [ 1506.962204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1506.971567] Call Trace: [ 1506.974175] dump_stack+0x1fc/0x2fe [ 1506.977820] should_fail.cold+0xa/0x14 [ 1506.981720] ? setup_fault_attr+0x200/0x200 [ 1506.986053] ? lock_acquire+0x170/0x3c0 [ 1506.990035] ? lock_downgrade+0x720/0x720 [ 1506.994187] __should_failslab+0x115/0x180 [ 1506.998428] should_failslab+0x5/0xf [ 1507.002147] kmem_cache_alloc+0x277/0x370 [ 1507.006415] __kernfs_new_node+0xd2/0x680 [ 1507.010567] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1507.015328] ? __mutex_unlock_slowpath+0xea/0x610 [ 1507.020174] ? kernfs_add_one+0x51/0x4c0 [ 1507.024245] ? wait_for_completion_io+0x10/0x10 [ 1507.028926] ? kernfs_next_descendant_post+0x19c/0x290 [ 1507.034211] kernfs_new_node+0x92/0x120 [ 1507.038224] __kernfs_create_file+0x51/0x33f [ 1507.042643] sysfs_add_file_mode_ns+0x226/0x540 [ 1507.047324] internal_create_group+0x355/0xb20 [ 1507.051918] ? sysfs_remove_link_from_group+0x70/0x70 [ 1507.057111] ? lock_downgrade+0x720/0x720 [ 1507.061273] lo_ioctl+0xf7c/0x20e0 [ 1507.064820] ? loop_set_status64+0x110/0x110 [ 1507.069231] blkdev_ioctl+0x5cb/0x1a7e [ 1507.073129] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1507.078504] ? blkpg_ioctl+0x9d0/0x9d0 [ 1507.082399] ? mark_held_locks+0xf0/0xf0 [ 1507.086466] ? mark_held_locks+0xf0/0xf0 [ 1507.090532] ? timespec64_trunc+0xf2/0x190 [ 1507.094770] ? mark_held_locks+0xf0/0xf0 [ 1507.098839] ? lock_downgrade+0x720/0x720 [ 1507.102996] block_ioctl+0xe9/0x130 [ 1507.106632] ? blkdev_fallocate+0x3f0/0x3f0 [ 1507.110959] do_vfs_ioctl+0xcdb/0x12e0 [ 1507.114857] ? selinux_file_ioctl+0x506/0x6c0 [ 1507.119360] ? ioctl_preallocate+0x200/0x200 [ 1507.123773] ? selinux_inode_link+0x20/0x20 [ 1507.128098] ? __fget+0x356/0x510 [ 1507.131559] ? do_dup2+0x450/0x450 [ 1507.135115] ksys_ioctl+0x9b/0xc0 [ 1507.138575] __x64_sys_ioctl+0x6f/0xb0 [ 1507.142465] do_syscall_64+0xf9/0x620 [ 1507.146297] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1507.151483] RIP: 0033:0x45c9e7 [ 1507.154675] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:26:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF2(r2, 0xc0045878, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "9302ebe84c7dd79afb9e59ba349a10ba3a40cb"}) [ 1507.173584] RSP: 002b:00007f80a04f1a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1507.181306] RAX: ffffffffffffffda RBX: 000000000050a0c0 RCX: 000000000045c9e7 [ 1507.188583] RDX: 0000000000000007 RSI: 0000000000004c00 RDI: 0000000000000008 [ 1507.195855] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 000000000000000a [ 1507.203127] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1507.210400] R13: 0000000000000c2b R14: 00000000004ce79f R15: 00007f80a04f26d4 13:26:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x4a}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r2, @ANYBLOB="0000400000000002280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@ipv4_newaddr={0x30, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0xa0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast2}, @IFA_BROADCAST={0x8, 0x4, @broadcast}, @IFA_FLAGS={0x8, 0x8, 0x400}]}, 0x30}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x4a}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r6, @ANYBLOB="0000400000000002280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@ipv4_newaddr={0x30, 0x14, 0x121, 0x0, 0x0, {0x2, 0x1, 0xa0, 0x0, r6}, [@IFA_LOCAL={0x8, 0x2, @multicast2}, @IFA_FLAGS={0x8, 0x8, 0x4}, @IFA_FLAGS={0x8, 0x8, 0x400}]}, 0x30}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000001dc0)=[{{&(0x7f0000000180)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f00000001c0)}}, {{&(0x7f0000000200)={0x2, 0x4e24, @loopback}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000240)="7d53e39ee0a79e00e01c234eebed112839e14a7fd411bda047faa2af0f095bbe210b986785be25f0a7", 0x29}, {&(0x7f0000000280)="11ec63ca9f1bf2d778c15ecc2c88372789d91d471d8711c1ae0533e520813d1cc3fd7befe62b9d120ed16ed187dbb754e0050d0627b8eed042f5f3160b7c13e028934c0605c23439571d31ba629f8d4bfe238287eb411f45d29ba357b751faf590b605f31d5000c920a7fe7c6e01cfa60bc1af0b031f3d0fa255e7caa9ad3323d61bf1e11a742b30cbc62e12728866fd800d850f181cbda612d596be86c2b1dbfb57c631095364c126", 0xa9}, {&(0x7f0000000340)="d83b04f0a4e15ca5e73dfd23fa76c263ed3f9cb7d5ca44c96938ff5b6baea339366dcb4e2ccd36524d8d3a5bd6f246a2535eaaf7fe7b3bf41a6a83273a3ed513f2a93ba9d2a6aa05ba0e6a113b3d1511c56ea0c2e11daa43368e2b0c9bd8eb5c209785863755bfa249c64b483fd23005f543081b8d6718fe7afc61a5679dd767eca7cca74a58ee19d5e652adfbc77e8abcf9", 0x92}, {&(0x7f0000000400)="8980be5215d359df7e0e78f588a01ddf3818ba17121ce38f00f77117e18e585f52855d0ef9e5cecd057bbe08b1807545d81f2bf73f48ae0e435ec912a6cf962391c133f5eb7f12b87d0e661160e51f8bc983d09effbe8778a36376a537ff81e72c3c6d23057f088a1f5621688d816fb86123c7a3e68c969cbe0e949e23493eb49076579f39f638bd65317afb8a595aa29bef132546ef518ac30c72b7c3a56ed833d7cfd8e510b0bc9b5c97e0cda54d26960e3a7f7a", 0xb5}, {&(0x7f00000004c0)="f084d062dd0192189433111c94253f844c63c9ef9c861aff05acff20eb43ab475aebd834f2fc37feb28567cb22377276895e24f752f0ec21b19095525d9a414c069db7830ff5b8945b8027fb1f6626beb8", 0x51}, {&(0x7f0000000540)="5fa81f4d1048a2c9eb7c5917056fb6c8cf31b1094303b7d609ea95a5eecc23f94e0917317d9aa2e420bb94d400eb9b3f45ce4472c0c80557945256807c15e6a4cafaaf9c3197e9ebe4bcc107ab9319e224410db3d8cf8892d33816a5a95ec6163383fda46ab428ae424b51a42e770d7263831125bd544018a3afad3e9b3a7c956dca5400", 0x84}, {&(0x7f0000000600)="76dd49988ea42fda272fad2f76937d09885076bb18b8d67ffb1ec0257b5e42efeb968b2386535ae35a92a8a1a4edc8178de33bd4e1a7835d0b66cea67375391a4e19b820b647af51098c535be443cf15371f46ae5aeb932245ff4129053405d3f4057e0d65bd2bb182a24aef685ca6aaffd584d47f221a8f61bf", 0x7a}, {&(0x7f0000000680)="3f613a366531a163d4ca2d332522893df8537f31f5f718310261904e4d556907c9e64c7d21522968d5f3c2670269977e4a7b149e45c62331ab68d7420ced189c60da9deca9424d1efe07d2e0b40faf391defeafebe3d9b40162489a18341", 0x5e