5d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:11 executing program 1: syz_mount_image$ceph(&(0x7f00000005c0)='ceph\x00', &(0x7f0000000600)='./bus\x00', 0x6, 0x7, &(0x7f0000000a80)=[{&(0x7f0000000640)="29b639b3be916259c6b45813af9c9bea58c893041f5916565140186488800037962d0c6a2de6e91d01ddd443779759259cfacae42549bb5f4fada9b8296e25849dcfbdd3efa1b28e4fbeb082f41bc678fb3e1f6d40714b5a67c40bdc118adf53c352197ef731b3757fee2741321af9e1ddbcebd1", 0x74, 0x8}, {&(0x7f00000006c0)="cc8dad1e7c6b53be777c6e9fe99dcbbbe06e78173d3c5ccd2661ac56d1bf8307a503cf5a8ac8f6785c967e38af606eb8d12bf83e009acb1e3fa2cd7d64e78d0fdfbdb131f582430d00d6142ae489be233b79c8caa5b5509f1cd10a24b8be5a0b8758f0d23ec7147c8e86896c0252a8188c83401d8b9acd98543313f98e87f655d186e7709712d805bb8baaedb33b2d3af46031e3e3e49311a64898e28d0c092abfb8f06d4886e7b51ead8a5166d28c7b2af25ab6be8064", 0xb7, 0x5}, {&(0x7f0000000780)="5a4c98de57186f01a1a8492fa92ead4ba752c0ff48fe0a3da3c0c2e4cd98faa1c5bf00df4e6fdc7f1ffdb7868fe8a4216eb9fa1d1d6963badf40e11c64a7296d1add2fd42d6bd235a8f0322ee470e510da54367f35eac40e0c6d6968559ae7f22afd74d4bbc3018752d690cf2f8c174b740b", 0x72, 0x6}, {&(0x7f0000000800)="551af39ab5fed7df8efce6e161b68e4f3fafa3edd0e37bdae1afac02de689ee5e05319cd82bc49dd39691e2828dcbe3cf5cc3a03602410fcce7e72569477e199babb171bb21d9177dc888bcc1b4d251525e4e0deeb7f3f6f4d566669fb44cf3930456bb8a31e9ee836ad4814c2e884e2d70eb289158d1bba98b5913bd47d617fcaee5cbeb0ea10db4cce71ad9b9d1222ec5e77bdf1f0fbe3365ad7c6d9548ed48c06dc25bc4f551e52bf93a5bd28c177567f5346265faff9d96e9d7b39c7a412241d109de639e439", 0xc8, 0x400}, {&(0x7f0000000900)="6ec80682a907415e55c72e5207cc008d167bea44bf92ba927da4a4ba8894cbe05c0a1ae3e9a6a2adf18f9b34be40a6bf16021b8af3db57501d293b9100fa6e464c4ba70f35edff20c017", 0x4a, 0x80000001}, {&(0x7f0000000980)="bb209133a76e5ccb7f49bb5d5c5dc1b8b71f8705bda7e2356664388b62577891d51fa717a2d14ecde15c6d59f5503a4fcb128c49490781caccb5194354c8b25d43d30d4e4e0b07985e7e88dc3a065a969c2cddc123af7613ba773923ffa919d641d4e72742f0a664799c92de0e5177c9c102922968cf0f8f38366aab771f71714c79e651b4bd41485eeb2d938f18b1c9d9f77c9012b2f07788a1bbd31e9f1736d3", 0xa1, 0x3}, {&(0x7f0000000a40)="c3c0af5a31d2a76103b9", 0xa, 0x22}], 0x2, &(0x7f0000000b40)='iocharset') r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000140)={{0x2f, @rand_addr=0x6, 0x4e23, 0x2, 'fo\x00', 0x10, 0x8, 0x27}, {@dev={0xac, 0x14, 0x14, 0x20}, 0x4e21, 0x10000, 0x3ff, 0x0, 0x101}}, 0x44) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) 07:31:11 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, r2, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)) [ 1158.401064][T20989] Missing colon 07:31:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf0") prctl$PR_SET_PDEATHSIG(0x1, 0x24) [ 1158.436845][T20995] IPVS: set_ctl: invalid protocol: 47 0.0.0.6:20003 [ 1158.445615][T20992] Missing colon [ 1158.493405][T20985] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 07:31:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") prctl$PR_SET_PDEATHSIG(0x1, 0x0) [ 1158.584318][T20997] hfs: gid requires an argument [ 1158.590622][T20995] hfs: gid requires an argument [ 1158.601832][T20995] hfs: unable to parse mount options [ 1158.610791][T20997] hfs: unable to parse mount options 07:31:11 executing program 0: syz_mount_image$ceph(&(0x7f00000005c0)='ceph\x00', &(0x7f0000000600)='./bus\x00', 0x6, 0x7, &(0x7f0000000a80)=[{&(0x7f0000000640)="29b639b3be916259c6b45813af9c9bea58c893041f5916565140186488800037962d0c6a2de6e91d01ddd443779759259cfacae42549bb5f4fada9b8296e25849dcfbdd3efa1b28e4fbeb082f41bc678fb3e1f6d40714b5a67c40bdc118adf53c352197ef731b3757fee2741321af9e1ddbcebd1", 0x74, 0x8}, {&(0x7f00000006c0)="cc8dad1e7c6b53be777c6e9fe99dcbbbe06e78173d3c5ccd2661ac56d1bf8307a503cf5a8ac8f6785c967e38af606eb8d12bf83e009acb1e3fa2cd7d64e78d0fdfbdb131f582430d00d6142ae489be233b79c8caa5b5509f1cd10a24b8be5a0b8758f0d23ec7147c8e86896c0252a8188c83401d8b9acd98543313f98e87f655d186e7709712d805bb8baaedb33b2d3af46031e3e3e49311a64898e28d0c092abfb8f06d4886e7b51ead8a5166d28c7b2af25ab6be8064", 0xb7, 0x5}, {&(0x7f0000000780)="5a4c98de57186f01a1a8492fa92ead4ba752c0ff48fe0a3da3c0c2e4cd98faa1c5bf00df4e6fdc7f1ffdb7868fe8a4216eb9fa1d1d6963badf40e11c64a7296d1add2fd42d6bd235a8f0322ee470e510da54367f35eac40e0c6d6968559ae7f22afd74d4bbc3018752d690cf2f8c174b740b", 0x72, 0x6}, {&(0x7f0000000800)="551af39ab5fed7df8efce6e161b68e4f3fafa3edd0e37bdae1afac02de689ee5e05319cd82bc49dd39691e2828dcbe3cf5cc3a03602410fcce7e72569477e199babb171bb21d9177dc888bcc1b4d251525e4e0deeb7f3f6f4d566669fb44cf3930456bb8a31e9ee836ad4814c2e884e2d70eb289158d1bba98b5913bd47d617fcaee5cbeb0ea10db4cce71ad9b9d1222ec5e77bdf1f0fbe3365ad7c6d9548ed48c06dc25bc4f551e52bf93a5bd28c177567f5346265faff9d96e9d7b39c7a412241d109de639e439", 0xc8, 0x400}, {&(0x7f0000000900)="6ec80682a907415e55c72e5207cc008d167bea44bf92ba927da4a4ba8894cbe05c0a1ae3e9a6a2adf18f9b34be40a6bf16021b8af3db57501d293b9100fa6e464c4ba70f35edff20c017", 0x4a, 0x80000001}, {&(0x7f0000000980)="bb209133a76e5ccb7f49bb5d5c5dc1b8b71f8705bda7e2356664388b62577891d51fa717a2d14ecde15c6d59f5503a4fcb128c49490781caccb5194354c8b25d43d30d4e4e0b07985e7e88dc3a065a969c2cddc123af7613ba773923ffa919d641d4e72742f0a664799c92de0e5177c9c102922968cf0f8f38366aab771f71714c79e651b4bd41485eeb2d938f18b1c9d9f77c9012b2f07788a1bbd31e9f1736d3", 0xa1, 0x3}, {&(0x7f0000000a40)="c3c0af5a31d2a76103b9", 0xa, 0x22}], 0x2, &(0x7f0000000b40)='iocharset') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r0}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:11 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, r2, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)) 07:31:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x7ff, 0x1, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x7, 0x300) socket$kcm(0x10, 0x400800000000000, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) bpf$OBJ_PIN_MAP(0x6, 0x0, 0xfffffffffffffedc) openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 07:31:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x7ff, 0x1, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x7, 0x300) socket$kcm(0x10, 0x400800000000000, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) bpf$OBJ_PIN_MAP(0x6, 0x0, 0xfffffffffffffedc) openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 1158.786859][T21010] Missing colon [ 1158.850542][T21015] hfs: unable to parse mount options [ 1158.917949][T21021] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1159.080634][T21023] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 07:31:12 executing program 0: syz_mount_image$ceph(&(0x7f00000005c0)='ceph\x00', &(0x7f0000000600)='./bus\x00', 0x6, 0x7, &(0x7f0000000a80)=[{&(0x7f0000000640)="29b639b3be916259c6b45813af9c9bea58c893041f5916565140186488800037962d0c6a2de6e91d01ddd443779759259cfacae42549bb5f4fada9b8296e25849dcfbdd3efa1b28e4fbeb082f41bc678fb3e1f6d40714b5a67c40bdc118adf53c352197ef731b3757fee2741321af9e1ddbcebd1", 0x74, 0x8}, {&(0x7f00000006c0)="cc8dad1e7c6b53be777c6e9fe99dcbbbe06e78173d3c5ccd2661ac56d1bf8307a503cf5a8ac8f6785c967e38af606eb8d12bf83e009acb1e3fa2cd7d64e78d0fdfbdb131f582430d00d6142ae489be233b79c8caa5b5509f1cd10a24b8be5a0b8758f0d23ec7147c8e86896c0252a8188c83401d8b9acd98543313f98e87f655d186e7709712d805bb8baaedb33b2d3af46031e3e3e49311a64898e28d0c092abfb8f06d4886e7b51ead8a5166d28c7b2af25ab6be8064", 0xb7, 0x5}, {&(0x7f0000000780)="5a4c98de57186f01a1a8492fa92ead4ba752c0ff48fe0a3da3c0c2e4cd98faa1c5bf00df4e6fdc7f1ffdb7868fe8a4216eb9fa1d1d6963badf40e11c64a7296d1add2fd42d6bd235a8f0322ee470e510da54367f35eac40e0c6d6968559ae7f22afd74d4bbc3018752d690cf2f8c174b740b", 0x72, 0x6}, {&(0x7f0000000800)="551af39ab5fed7df8efce6e161b68e4f3fafa3edd0e37bdae1afac02de689ee5e05319cd82bc49dd39691e2828dcbe3cf5cc3a03602410fcce7e72569477e199babb171bb21d9177dc888bcc1b4d251525e4e0deeb7f3f6f4d566669fb44cf3930456bb8a31e9ee836ad4814c2e884e2d70eb289158d1bba98b5913bd47d617fcaee5cbeb0ea10db4cce71ad9b9d1222ec5e77bdf1f0fbe3365ad7c6d9548ed48c06dc25bc4f551e52bf93a5bd28c177567f5346265faff9d96e9d7b39c7a412241d109de639e439", 0xc8, 0x400}, {&(0x7f0000000900)="6ec80682a907415e55c72e5207cc008d167bea44bf92ba927da4a4ba8894cbe05c0a1ae3e9a6a2adf18f9b34be40a6bf16021b8af3db57501d293b9100fa6e464c4ba70f35edff20c017", 0x4a, 0x80000001}, {&(0x7f0000000980)="bb209133a76e5ccb7f49bb5d5c5dc1b8b71f8705bda7e2356664388b62577891d51fa717a2d14ecde15c6d59f5503a4fcb128c49490781caccb5194354c8b25d43d30d4e4e0b07985e7e88dc3a065a969c2cddc123af7613ba773923ffa919d641d4e72742f0a664799c92de0e5177c9c102922968cf0f8f38366aab771f71714c79e651b4bd41485eeb2d938f18b1c9d9f77c9012b2f07788a1bbd31e9f1736d3", 0xa1, 0x3}, {&(0x7f0000000a40)="c3c0af5a31d2a76103b9", 0xa, 0x22}], 0x2, &(0x7f0000000b40)='iocharset') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r0}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:12 executing program 1: syz_mount_image$ceph(&(0x7f00000005c0)='ceph\x00', &(0x7f0000000600)='./bus\x00', 0x6, 0x7, &(0x7f0000000a80)=[{&(0x7f0000000640)="29b639b3be916259c6b45813af9c9bea58c893041f5916565140186488800037962d0c6a2de6e91d01ddd443779759259cfacae42549bb5f4fada9b8296e25849dcfbdd3efa1b28e4fbeb082f41bc678fb3e1f6d40714b5a67c40bdc118adf53c352197ef731b3757fee2741321af9e1ddbcebd1", 0x74, 0x8}, {&(0x7f00000006c0)="cc8dad1e7c6b53be777c6e9fe99dcbbbe06e78173d3c5ccd2661ac56d1bf8307a503cf5a8ac8f6785c967e38af606eb8d12bf83e009acb1e3fa2cd7d64e78d0fdfbdb131f582430d00d6142ae489be233b79c8caa5b5509f1cd10a24b8be5a0b8758f0d23ec7147c8e86896c0252a8188c83401d8b9acd98543313f98e87f655d186e7709712d805bb8baaedb33b2d3af46031e3e3e49311a64898e28d0c092abfb8f06d4886e7b51ead8a5166d28c7b2af25ab6be8064", 0xb7, 0x5}, {&(0x7f0000000780)="5a4c98de57186f01a1a8492fa92ead4ba752c0ff48fe0a3da3c0c2e4cd98faa1c5bf00df4e6fdc7f1ffdb7868fe8a4216eb9fa1d1d6963badf40e11c64a7296d1add2fd42d6bd235a8f0322ee470e510da54367f35eac40e0c6d6968559ae7f22afd74d4bbc3018752d690cf2f8c174b740b", 0x72, 0x6}, {&(0x7f0000000800)="551af39ab5fed7df8efce6e161b68e4f3fafa3edd0e37bdae1afac02de689ee5e05319cd82bc49dd39691e2828dcbe3cf5cc3a03602410fcce7e72569477e199babb171bb21d9177dc888bcc1b4d251525e4e0deeb7f3f6f4d566669fb44cf3930456bb8a31e9ee836ad4814c2e884e2d70eb289158d1bba98b5913bd47d617fcaee5cbeb0ea10db4cce71ad9b9d1222ec5e77bdf1f0fbe3365ad7c6d9548ed48c06dc25bc4f551e52bf93a5bd28c177567f5346265faff9d96e9d7b39c7a412241d109de639e439", 0xc8, 0x400}, {&(0x7f0000000900)="6ec80682a907415e55c72e5207cc008d167bea44bf92ba927da4a4ba8894cbe05c0a1ae3e9a6a2adf18f9b34be40a6bf16021b8af3db57501d293b9100fa6e464c4ba70f35edff20c017", 0x4a, 0x80000001}, {&(0x7f0000000980)="bb209133a76e5ccb7f49bb5d5c5dc1b8b71f8705bda7e2356664388b62577891d51fa717a2d14ecde15c6d59f5503a4fcb128c49490781caccb5194354c8b25d43d30d4e4e0b07985e7e88dc3a065a969c2cddc123af7613ba773923ffa919d641d4e72742f0a664799c92de0e5177c9c102922968cf0f8f38366aab771f71714c79e651b4bd41485eeb2d938f18b1c9d9f77c9012b2f07788a1bbd31e9f1736d3", 0xa1, 0x3}, {&(0x7f0000000a40)="c3c0af5a31d2a76103b9", 0xa, 0x22}], 0x2, &(0x7f0000000b40)='iocharset') r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000140)={{0x2f, @rand_addr=0x6, 0x4e23, 0x2, 'fo\x00', 0x10, 0x8, 0x27}, {@dev={0xac, 0x14, 0x14, 0x20}, 0x4e21, 0x10000, 0x3ff, 0x0, 0x101}}, 0x44) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) 07:31:12 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, r2, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)) 07:31:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x7ff, 0x1, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x7, 0x300) socket$kcm(0x10, 0x400800000000000, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) bpf$OBJ_PIN_MAP(0x6, 0x0, 0xfffffffffffffedc) openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 07:31:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x7ff, 0x1, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x7, 0x300) socket$kcm(0x10, 0x400800000000000, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) bpf$OBJ_PIN_MAP(0x6, 0x0, 0xfffffffffffffedc) openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 1159.311420][T21030] Missing colon [ 1159.322481][T21032] Missing colon [ 1159.333031][T21035] IPVS: set_ctl: invalid protocol: 47 0.0.0.6:20003 [ 1159.427469][T21035] hfs: gid requires an argument [ 1159.428146][T21037] hfs: unable to parse mount options [ 1159.445052][T21035] hfs: unable to parse mount options 07:31:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x7ff, 0x1, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x7, 0x300) socket$kcm(0x10, 0x400800000000000, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) bpf$OBJ_PIN_MAP(0x6, 0x0, 0xfffffffffffffedc) openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 07:31:12 executing program 0: syz_mount_image$ceph(&(0x7f00000005c0)='ceph\x00', &(0x7f0000000600)='./bus\x00', 0x6, 0x7, &(0x7f0000000a80)=[{&(0x7f0000000640)="29b639b3be916259c6b45813af9c9bea58c893041f5916565140186488800037962d0c6a2de6e91d01ddd443779759259cfacae42549bb5f4fada9b8296e25849dcfbdd3efa1b28e4fbeb082f41bc678fb3e1f6d40714b5a67c40bdc118adf53c352197ef731b3757fee2741321af9e1ddbcebd1", 0x74, 0x8}, {&(0x7f00000006c0)="cc8dad1e7c6b53be777c6e9fe99dcbbbe06e78173d3c5ccd2661ac56d1bf8307a503cf5a8ac8f6785c967e38af606eb8d12bf83e009acb1e3fa2cd7d64e78d0fdfbdb131f582430d00d6142ae489be233b79c8caa5b5509f1cd10a24b8be5a0b8758f0d23ec7147c8e86896c0252a8188c83401d8b9acd98543313f98e87f655d186e7709712d805bb8baaedb33b2d3af46031e3e3e49311a64898e28d0c092abfb8f06d4886e7b51ead8a5166d28c7b2af25ab6be8064", 0xb7, 0x5}, {&(0x7f0000000780)="5a4c98de57186f01a1a8492fa92ead4ba752c0ff48fe0a3da3c0c2e4cd98faa1c5bf00df4e6fdc7f1ffdb7868fe8a4216eb9fa1d1d6963badf40e11c64a7296d1add2fd42d6bd235a8f0322ee470e510da54367f35eac40e0c6d6968559ae7f22afd74d4bbc3018752d690cf2f8c174b740b", 0x72, 0x6}, {&(0x7f0000000800)="551af39ab5fed7df8efce6e161b68e4f3fafa3edd0e37bdae1afac02de689ee5e05319cd82bc49dd39691e2828dcbe3cf5cc3a03602410fcce7e72569477e199babb171bb21d9177dc888bcc1b4d251525e4e0deeb7f3f6f4d566669fb44cf3930456bb8a31e9ee836ad4814c2e884e2d70eb289158d1bba98b5913bd47d617fcaee5cbeb0ea10db4cce71ad9b9d1222ec5e77bdf1f0fbe3365ad7c6d9548ed48c06dc25bc4f551e52bf93a5bd28c177567f5346265faff9d96e9d7b39c7a412241d109de639e439", 0xc8, 0x400}, {&(0x7f0000000900)="6ec80682a907415e55c72e5207cc008d167bea44bf92ba927da4a4ba8894cbe05c0a1ae3e9a6a2adf18f9b34be40a6bf16021b8af3db57501d293b9100fa6e464c4ba70f35edff20c017", 0x4a, 0x80000001}, {&(0x7f0000000980)="bb209133a76e5ccb7f49bb5d5c5dc1b8b71f8705bda7e2356664388b62577891d51fa717a2d14ecde15c6d59f5503a4fcb128c49490781caccb5194354c8b25d43d30d4e4e0b07985e7e88dc3a065a969c2cddc123af7613ba773923ffa919d641d4e72742f0a664799c92de0e5177c9c102922968cf0f8f38366aab771f71714c79e651b4bd41485eeb2d938f18b1c9d9f77c9012b2f07788a1bbd31e9f1736d3", 0xa1, 0x3}, {&(0x7f0000000a40)="c3c0af5a31d2a76103b9", 0xa, 0x22}], 0x2, &(0x7f0000000b40)='iocharset') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r0}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:12 executing program 1: syz_mount_image$ceph(&(0x7f00000005c0)='ceph\x00', &(0x7f0000000600)='./bus\x00', 0x6, 0x7, &(0x7f0000000a80)=[{&(0x7f0000000640)="29b639b3be916259c6b45813af9c9bea58c893041f5916565140186488800037962d0c6a2de6e91d01ddd443779759259cfacae42549bb5f4fada9b8296e25849dcfbdd3efa1b28e4fbeb082f41bc678fb3e1f6d40714b5a67c40bdc118adf53c352197ef731b3757fee2741321af9e1ddbcebd1", 0x74, 0x8}, {&(0x7f00000006c0)="cc8dad1e7c6b53be777c6e9fe99dcbbbe06e78173d3c5ccd2661ac56d1bf8307a503cf5a8ac8f6785c967e38af606eb8d12bf83e009acb1e3fa2cd7d64e78d0fdfbdb131f582430d00d6142ae489be233b79c8caa5b5509f1cd10a24b8be5a0b8758f0d23ec7147c8e86896c0252a8188c83401d8b9acd98543313f98e87f655d186e7709712d805bb8baaedb33b2d3af46031e3e3e49311a64898e28d0c092abfb8f06d4886e7b51ead8a5166d28c7b2af25ab6be8064", 0xb7, 0x5}, {&(0x7f0000000780)="5a4c98de57186f01a1a8492fa92ead4ba752c0ff48fe0a3da3c0c2e4cd98faa1c5bf00df4e6fdc7f1ffdb7868fe8a4216eb9fa1d1d6963badf40e11c64a7296d1add2fd42d6bd235a8f0322ee470e510da54367f35eac40e0c6d6968559ae7f22afd74d4bbc3018752d690cf2f8c174b740b", 0x72, 0x6}, {&(0x7f0000000800)="551af39ab5fed7df8efce6e161b68e4f3fafa3edd0e37bdae1afac02de689ee5e05319cd82bc49dd39691e2828dcbe3cf5cc3a03602410fcce7e72569477e199babb171bb21d9177dc888bcc1b4d251525e4e0deeb7f3f6f4d566669fb44cf3930456bb8a31e9ee836ad4814c2e884e2d70eb289158d1bba98b5913bd47d617fcaee5cbeb0ea10db4cce71ad9b9d1222ec5e77bdf1f0fbe3365ad7c6d9548ed48c06dc25bc4f551e52bf93a5bd28c177567f5346265faff9d96e9d7b39c7a412241d109de639e439", 0xc8, 0x400}, {&(0x7f0000000900)="6ec80682a907415e55c72e5207cc008d167bea44bf92ba927da4a4ba8894cbe05c0a1ae3e9a6a2adf18f9b34be40a6bf16021b8af3db57501d293b9100fa6e464c4ba70f35edff20c017", 0x4a, 0x80000001}, {&(0x7f0000000980)="bb209133a76e5ccb7f49bb5d5c5dc1b8b71f8705bda7e2356664388b62577891d51fa717a2d14ecde15c6d59f5503a4fcb128c49490781caccb5194354c8b25d43d30d4e4e0b07985e7e88dc3a065a969c2cddc123af7613ba773923ffa919d641d4e72742f0a664799c92de0e5177c9c102922968cf0f8f38366aab771f71714c79e651b4bd41485eeb2d938f18b1c9d9f77c9012b2f07788a1bbd31e9f1736d3", 0xa1, 0x3}, {&(0x7f0000000a40)="c3c0af5a31d2a76103b9", 0xa, 0x22}], 0x2, &(0x7f0000000b40)='iocharset') r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000140)={{0x2f, @rand_addr=0x6, 0x4e23, 0x2, 'fo\x00', 0x10, 0x8, 0x27}, {@dev={0xac, 0x14, 0x14, 0x20}, 0x4e21, 0x10000, 0x3ff, 0x0, 0x101}}, 0x44) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid'}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) 07:31:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x7ff, 0x1, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x7, 0x300) socket$kcm(0x10, 0x400800000000000, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) bpf$OBJ_PIN_MAP(0x6, 0x0, 0xfffffffffffffedc) openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 07:31:12 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, r2, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)) 07:31:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x7ff, 0x1, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x7, 0x300) socket$kcm(0x10, 0x400800000000000, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) bpf$OBJ_PIN_MAP(0x6, 0x0, 0xfffffffffffffedc) openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 1159.728787][T21148] Missing colon [ 1159.754129][T21149] Missing colon [ 1159.771747][T21156] IPVS: set_ctl: invalid protocol: 47 0.0.0.6:20003 [ 1159.839363][T21224] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1159.918294][T21154] hfs: unable to parse mount options [ 1159.924650][T21156] hfs: unable to parse mount options 07:31:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x7ff, 0x1, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x7, 0x300) socket$kcm(0x10, 0x400800000000000, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) bpf$OBJ_PIN_MAP(0x6, 0x0, 0xfffffffffffffedc) openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) 07:31:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:13 executing program 1: syz_mount_image$ceph(&(0x7f00000005c0)='ceph\x00', &(0x7f0000000600)='./bus\x00', 0x6, 0x7, &(0x7f0000000a80)=[{&(0x7f0000000640)="29b639b3be916259c6b45813af9c9bea58c893041f5916565140186488800037962d0c6a2de6e91d01ddd443779759259cfacae42549bb5f4fada9b8296e25849dcfbdd3efa1b28e4fbeb082f41bc678fb3e1f6d40714b5a67c40bdc118adf53c352197ef731b3757fee2741321af9e1ddbcebd1", 0x74, 0x8}, {&(0x7f00000006c0)="cc8dad1e7c6b53be777c6e9fe99dcbbbe06e78173d3c5ccd2661ac56d1bf8307a503cf5a8ac8f6785c967e38af606eb8d12bf83e009acb1e3fa2cd7d64e78d0fdfbdb131f582430d00d6142ae489be233b79c8caa5b5509f1cd10a24b8be5a0b8758f0d23ec7147c8e86896c0252a8188c83401d8b9acd98543313f98e87f655d186e7709712d805bb8baaedb33b2d3af46031e3e3e49311a64898e28d0c092abfb8f06d4886e7b51ead8a5166d28c7b2af25ab6be8064", 0xb7, 0x5}, {&(0x7f0000000780)="5a4c98de57186f01a1a8492fa92ead4ba752c0ff48fe0a3da3c0c2e4cd98faa1c5bf00df4e6fdc7f1ffdb7868fe8a4216eb9fa1d1d6963badf40e11c64a7296d1add2fd42d6bd235a8f0322ee470e510da54367f35eac40e0c6d6968559ae7f22afd74d4bbc3018752d690cf2f8c174b740b", 0x72, 0x6}, {&(0x7f0000000800)="551af39ab5fed7df8efce6e161b68e4f3fafa3edd0e37bdae1afac02de689ee5e05319cd82bc49dd39691e2828dcbe3cf5cc3a03602410fcce7e72569477e199babb171bb21d9177dc888bcc1b4d251525e4e0deeb7f3f6f4d566669fb44cf3930456bb8a31e9ee836ad4814c2e884e2d70eb289158d1bba98b5913bd47d617fcaee5cbeb0ea10db4cce71ad9b9d1222ec5e77bdf1f0fbe3365ad7c6d9548ed48c06dc25bc4f551e52bf93a5bd28c177567f5346265faff9d96e9d7b39c7a412241d109de639e439", 0xc8, 0x400}, {&(0x7f0000000900)="6ec80682a907415e55c72e5207cc008d167bea44bf92ba927da4a4ba8894cbe05c0a1ae3e9a6a2adf18f9b34be40a6bf16021b8af3db57501d293b9100fa6e464c4ba70f35edff20c017", 0x4a, 0x80000001}, {&(0x7f0000000980)="bb209133a76e5ccb7f49bb5d5c5dc1b8b71f8705bda7e2356664388b62577891d51fa717a2d14ecde15c6d59f5503a4fcb128c49490781caccb5194354c8b25d43d30d4e4e0b07985e7e88dc3a065a969c2cddc123af7613ba773923ffa919d641d4e72742f0a664799c92de0e5177c9c102922968cf0f8f38366aab771f71714c79e651b4bd41485eeb2d938f18b1c9d9f77c9012b2f07788a1bbd31e9f1736d3", 0xa1, 0x3}, {&(0x7f0000000a40)="c3c0af5a31d2a76103b9", 0xa, 0x22}], 0x2, &(0x7f0000000b40)='iocharset') r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000140)={{0x2f, @rand_addr=0x6, 0x4e23, 0x2, 'fo\x00', 0x10, 0x8, 0x27}, {@dev={0xac, 0x14, 0x14, 0x20}, 0x4e21, 0x10000, 0x3ff, 0x0, 0x101}}, 0x44) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid'}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) 07:31:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x7ff, 0x1, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x7, 0x300) socket$kcm(0x10, 0x400800000000000, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) bpf$OBJ_PIN_MAP(0x6, 0x0, 0xfffffffffffffedc) openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 07:31:13 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, r2, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)) [ 1160.127335][T21269] hfs: gid requires an argument [ 1160.138367][T21269] hfs: unable to parse mount options [ 1160.150266][T21272] Missing colon 07:31:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1160.180935][T21275] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1160.191950][T21276] IPVS: set_ctl: invalid protocol: 47 0.0.0.6:20003 [ 1160.273178][T21276] hfs: unable to parse mount options 07:31:13 executing program 1: syz_mount_image$ceph(&(0x7f00000005c0)='ceph\x00', &(0x7f0000000600)='./bus\x00', 0x6, 0x7, &(0x7f0000000a80)=[{&(0x7f0000000640)="29b639b3be916259c6b45813af9c9bea58c893041f5916565140186488800037962d0c6a2de6e91d01ddd443779759259cfacae42549bb5f4fada9b8296e25849dcfbdd3efa1b28e4fbeb082f41bc678fb3e1f6d40714b5a67c40bdc118adf53c352197ef731b3757fee2741321af9e1ddbcebd1", 0x74, 0x8}, {&(0x7f00000006c0)="cc8dad1e7c6b53be777c6e9fe99dcbbbe06e78173d3c5ccd2661ac56d1bf8307a503cf5a8ac8f6785c967e38af606eb8d12bf83e009acb1e3fa2cd7d64e78d0fdfbdb131f582430d00d6142ae489be233b79c8caa5b5509f1cd10a24b8be5a0b8758f0d23ec7147c8e86896c0252a8188c83401d8b9acd98543313f98e87f655d186e7709712d805bb8baaedb33b2d3af46031e3e3e49311a64898e28d0c092abfb8f06d4886e7b51ead8a5166d28c7b2af25ab6be8064", 0xb7, 0x5}, {&(0x7f0000000780)="5a4c98de57186f01a1a8492fa92ead4ba752c0ff48fe0a3da3c0c2e4cd98faa1c5bf00df4e6fdc7f1ffdb7868fe8a4216eb9fa1d1d6963badf40e11c64a7296d1add2fd42d6bd235a8f0322ee470e510da54367f35eac40e0c6d6968559ae7f22afd74d4bbc3018752d690cf2f8c174b740b", 0x72, 0x6}, {&(0x7f0000000800)="551af39ab5fed7df8efce6e161b68e4f3fafa3edd0e37bdae1afac02de689ee5e05319cd82bc49dd39691e2828dcbe3cf5cc3a03602410fcce7e72569477e199babb171bb21d9177dc888bcc1b4d251525e4e0deeb7f3f6f4d566669fb44cf3930456bb8a31e9ee836ad4814c2e884e2d70eb289158d1bba98b5913bd47d617fcaee5cbeb0ea10db4cce71ad9b9d1222ec5e77bdf1f0fbe3365ad7c6d9548ed48c06dc25bc4f551e52bf93a5bd28c177567f5346265faff9d96e9d7b39c7a412241d109de639e439", 0xc8, 0x400}, {&(0x7f0000000900)="6ec80682a907415e55c72e5207cc008d167bea44bf92ba927da4a4ba8894cbe05c0a1ae3e9a6a2adf18f9b34be40a6bf16021b8af3db57501d293b9100fa6e464c4ba70f35edff20c017", 0x4a, 0x80000001}, {&(0x7f0000000980)="bb209133a76e5ccb7f49bb5d5c5dc1b8b71f8705bda7e2356664388b62577891d51fa717a2d14ecde15c6d59f5503a4fcb128c49490781caccb5194354c8b25d43d30d4e4e0b07985e7e88dc3a065a969c2cddc123af7613ba773923ffa919d641d4e72742f0a664799c92de0e5177c9c102922968cf0f8f38366aab771f71714c79e651b4bd41485eeb2d938f18b1c9d9f77c9012b2f07788a1bbd31e9f1736d3", 0xa1, 0x3}, {&(0x7f0000000a40)="c3c0af5a31d2a76103b9", 0xa, 0x22}], 0x2, &(0x7f0000000b40)='iocharset') r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000140)={{0x2f, @rand_addr=0x6, 0x4e23, 0x2, 'fo\x00', 0x10, 0x8, 0x27}, {@dev={0xac, 0x14, 0x14, 0x20}, 0x4e21, 0x10000, 0x3ff, 0x0, 0x101}}, 0x44) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid'}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) [ 1160.362315][T21356] hfs: unable to parse mount options 07:31:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1160.488962][T21389] Missing colon 07:31:13 executing program 3: syz_mount_image$ceph(&(0x7f00000005c0)='ceph\x00', &(0x7f0000000600)='./bus\x00', 0x6, 0x7, &(0x7f0000000a80)=[{&(0x7f0000000640)="29b639b3be916259c6b45813af9c9bea58c893041f5916565140186488800037962d0c6a2de6e91d01ddd443779759259cfacae42549bb5f4fada9b8296e25849dcfbdd3efa1b28e4fbeb082f41bc678fb3e1f6d40714b5a67c40bdc118adf53c352197ef731b3757fee2741321af9e1ddbcebd1", 0x74, 0x8}, {&(0x7f00000006c0)="cc8dad1e7c6b53be777c6e9fe99dcbbbe06e78173d3c5ccd2661ac56d1bf8307a503cf5a8ac8f6785c967e38af606eb8d12bf83e009acb1e3fa2cd7d64e78d0fdfbdb131f582430d00d6142ae489be233b79c8caa5b5509f1cd10a24b8be5a0b8758f0d23ec7147c8e86896c0252a8188c83401d8b9acd98543313f98e87f655d186e7709712d805bb8baaedb33b2d3af46031e3e3e49311a64898e28d0c092abfb8f06d4886e7b51ead8a5166d28c7b2af25ab6be8064", 0xb7, 0x5}, {&(0x7f0000000780)="5a4c98de57186f01a1a8492fa92ead4ba752c0ff48fe0a3da3c0c2e4cd98faa1c5bf00df4e6fdc7f1ffdb7868fe8a4216eb9fa1d1d6963badf40e11c64a7296d1add2fd42d6bd235a8f0322ee470e510da54367f35eac40e0c6d6968559ae7f22afd74d4bbc3018752d690cf2f8c174b740b", 0x72, 0x6}, {&(0x7f0000000800)="551af39ab5fed7df8efce6e161b68e4f3fafa3edd0e37bdae1afac02de689ee5e05319cd82bc49dd39691e2828dcbe3cf5cc3a03602410fcce7e72569477e199babb171bb21d9177dc888bcc1b4d251525e4e0deeb7f3f6f4d566669fb44cf3930456bb8a31e9ee836ad4814c2e884e2d70eb289158d1bba98b5913bd47d617fcaee5cbeb0ea10db4cce71ad9b9d1222ec5e77bdf1f0fbe3365ad7c6d9548ed48c06dc25bc4f551e52bf93a5bd28c177567f5346265faff9d96e9d7b39c7a412241d109de639e439", 0xc8, 0x400}, {&(0x7f0000000900)="6ec80682a907415e55c72e5207cc008d167bea44bf92ba927da4a4ba8894cbe05c0a1ae3e9a6a2adf18f9b34be40a6bf16021b8af3db57501d293b9100fa6e464c4ba70f35edff20c017", 0x4a, 0x80000001}, {&(0x7f0000000980)="bb209133a76e5ccb7f49bb5d5c5dc1b8b71f8705bda7e2356664388b62577891d51fa717a2d14ecde15c6d59f5503a4fcb128c49490781caccb5194354c8b25d43d30d4e4e0b07985e7e88dc3a065a969c2cddc123af7613ba773923ffa919d641d4e72742f0a664799c92de0e5177c9c102922968cf0f8f38366aab771f71714c79e651b4bd41485eeb2d938f18b1c9d9f77c9012b2f07788a1bbd31e9f1736d3", 0xa1, 0x3}, {&(0x7f0000000a40)="c3c0af5a31d2a76103b9", 0xa, 0x22}], 0x2, &(0x7f0000000b40)='iocharset') r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000140)={{0x2f, @rand_addr=0x6, 0x4e23, 0x2, 'fo\x00', 0x10, 0x8, 0x27}, {@dev={0xac, 0x14, 0x14, 0x20}, 0x4e21, 0x10000, 0x3ff, 0x0, 0x101}}, 0x44) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid'}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) [ 1160.522888][T21391] IPVS: set_ctl: invalid protocol: 47 0.0.0.6:20003 [ 1160.538739][T21391] hfs: unable to parse mount options 07:31:13 executing program 2: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, r2, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)) 07:31:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x7ff, 0x1, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x7, 0x300) socket$kcm(0x10, 0x400800000000000, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) bpf$OBJ_PIN_MAP(0x6, 0x0, 0xfffffffffffffedc) openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) 07:31:13 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, r2, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)) 07:31:13 executing program 1: syz_mount_image$ceph(&(0x7f00000005c0)='ceph\x00', &(0x7f0000000600)='./bus\x00', 0x6, 0x7, &(0x7f0000000a80)=[{&(0x7f0000000640)="29b639b3be916259c6b45813af9c9bea58c893041f5916565140186488800037962d0c6a2de6e91d01ddd443779759259cfacae42549bb5f4fada9b8296e25849dcfbdd3efa1b28e4fbeb082f41bc678fb3e1f6d40714b5a67c40bdc118adf53c352197ef731b3757fee2741321af9e1ddbcebd1", 0x74, 0x8}, {&(0x7f00000006c0)="cc8dad1e7c6b53be777c6e9fe99dcbbbe06e78173d3c5ccd2661ac56d1bf8307a503cf5a8ac8f6785c967e38af606eb8d12bf83e009acb1e3fa2cd7d64e78d0fdfbdb131f582430d00d6142ae489be233b79c8caa5b5509f1cd10a24b8be5a0b8758f0d23ec7147c8e86896c0252a8188c83401d8b9acd98543313f98e87f655d186e7709712d805bb8baaedb33b2d3af46031e3e3e49311a64898e28d0c092abfb8f06d4886e7b51ead8a5166d28c7b2af25ab6be8064", 0xb7, 0x5}, {&(0x7f0000000780)="5a4c98de57186f01a1a8492fa92ead4ba752c0ff48fe0a3da3c0c2e4cd98faa1c5bf00df4e6fdc7f1ffdb7868fe8a4216eb9fa1d1d6963badf40e11c64a7296d1add2fd42d6bd235a8f0322ee470e510da54367f35eac40e0c6d6968559ae7f22afd74d4bbc3018752d690cf2f8c174b740b", 0x72, 0x6}, {&(0x7f0000000800)="551af39ab5fed7df8efce6e161b68e4f3fafa3edd0e37bdae1afac02de689ee5e05319cd82bc49dd39691e2828dcbe3cf5cc3a03602410fcce7e72569477e199babb171bb21d9177dc888bcc1b4d251525e4e0deeb7f3f6f4d566669fb44cf3930456bb8a31e9ee836ad4814c2e884e2d70eb289158d1bba98b5913bd47d617fcaee5cbeb0ea10db4cce71ad9b9d1222ec5e77bdf1f0fbe3365ad7c6d9548ed48c06dc25bc4f551e52bf93a5bd28c177567f5346265faff9d96e9d7b39c7a412241d109de639e439", 0xc8, 0x400}, {&(0x7f0000000900)="6ec80682a907415e55c72e5207cc008d167bea44bf92ba927da4a4ba8894cbe05c0a1ae3e9a6a2adf18f9b34be40a6bf16021b8af3db57501d293b9100fa6e464c4ba70f35edff20c017", 0x4a, 0x80000001}, {&(0x7f0000000980)="bb209133a76e5ccb7f49bb5d5c5dc1b8b71f8705bda7e2356664388b62577891d51fa717a2d14ecde15c6d59f5503a4fcb128c49490781caccb5194354c8b25d43d30d4e4e0b07985e7e88dc3a065a969c2cddc123af7613ba773923ffa919d641d4e72742f0a664799c92de0e5177c9c102922968cf0f8f38366aab771f71714c79e651b4bd41485eeb2d938f18b1c9d9f77c9012b2f07788a1bbd31e9f1736d3", 0xa1, 0x3}, {&(0x7f0000000a40)="c3c0af5a31d2a76103b9", 0xa, 0x22}], 0x2, &(0x7f0000000b40)='iocharset') r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) [ 1160.598988][T21394] hfs: unable to parse mount options [ 1160.617296][T21397] Missing colon [ 1160.652934][T21403] IPVS: set_ctl: invalid protocol: 47 0.0.0.6:20003 07:31:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1160.757379][T21441] Missing colon [ 1160.761697][T21403] hfs: unable to parse mount options 07:31:13 executing program 1: syz_mount_image$ceph(&(0x7f00000005c0)='ceph\x00', &(0x7f0000000600)='./bus\x00', 0x6, 0x7, &(0x7f0000000a80)=[{&(0x7f0000000640)="29b639b3be916259c6b45813af9c9bea58c893041f5916565140186488800037962d0c6a2de6e91d01ddd443779759259cfacae42549bb5f4fada9b8296e25849dcfbdd3efa1b28e4fbeb082f41bc678fb3e1f6d40714b5a67c40bdc118adf53c352197ef731b3757fee2741321af9e1ddbcebd1", 0x74, 0x8}, {&(0x7f00000006c0)="cc8dad1e7c6b53be777c6e9fe99dcbbbe06e78173d3c5ccd2661ac56d1bf8307a503cf5a8ac8f6785c967e38af606eb8d12bf83e009acb1e3fa2cd7d64e78d0fdfbdb131f582430d00d6142ae489be233b79c8caa5b5509f1cd10a24b8be5a0b8758f0d23ec7147c8e86896c0252a8188c83401d8b9acd98543313f98e87f655d186e7709712d805bb8baaedb33b2d3af46031e3e3e49311a64898e28d0c092abfb8f06d4886e7b51ead8a5166d28c7b2af25ab6be8064", 0xb7, 0x5}, {&(0x7f0000000780)="5a4c98de57186f01a1a8492fa92ead4ba752c0ff48fe0a3da3c0c2e4cd98faa1c5bf00df4e6fdc7f1ffdb7868fe8a4216eb9fa1d1d6963badf40e11c64a7296d1add2fd42d6bd235a8f0322ee470e510da54367f35eac40e0c6d6968559ae7f22afd74d4bbc3018752d690cf2f8c174b740b", 0x72, 0x6}, {&(0x7f0000000800)="551af39ab5fed7df8efce6e161b68e4f3fafa3edd0e37bdae1afac02de689ee5e05319cd82bc49dd39691e2828dcbe3cf5cc3a03602410fcce7e72569477e199babb171bb21d9177dc888bcc1b4d251525e4e0deeb7f3f6f4d566669fb44cf3930456bb8a31e9ee836ad4814c2e884e2d70eb289158d1bba98b5913bd47d617fcaee5cbeb0ea10db4cce71ad9b9d1222ec5e77bdf1f0fbe3365ad7c6d9548ed48c06dc25bc4f551e52bf93a5bd28c177567f5346265faff9d96e9d7b39c7a412241d109de639e439", 0xc8, 0x400}, {&(0x7f0000000900)="6ec80682a907415e55c72e5207cc008d167bea44bf92ba927da4a4ba8894cbe05c0a1ae3e9a6a2adf18f9b34be40a6bf16021b8af3db57501d293b9100fa6e464c4ba70f35edff20c017", 0x4a, 0x80000001}, {&(0x7f0000000980)="bb209133a76e5ccb7f49bb5d5c5dc1b8b71f8705bda7e2356664388b62577891d51fa717a2d14ecde15c6d59f5503a4fcb128c49490781caccb5194354c8b25d43d30d4e4e0b07985e7e88dc3a065a969c2cddc123af7613ba773923ffa919d641d4e72742f0a664799c92de0e5177c9c102922968cf0f8f38366aab771f71714c79e651b4bd41485eeb2d938f18b1c9d9f77c9012b2f07788a1bbd31e9f1736d3", 0xa1, 0x3}, {&(0x7f0000000a40)="c3c0af5a31d2a76103b9", 0xa, 0x22}], 0x2, &(0x7f0000000b40)='iocharset') r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) [ 1160.863284][T21513] hfs: unable to parse mount options 07:31:14 executing program 3: syz_mount_image$ceph(&(0x7f00000005c0)='ceph\x00', &(0x7f0000000600)='./bus\x00', 0x6, 0x7, &(0x7f0000000a80)=[{&(0x7f0000000640)="29b639b3be916259c6b45813af9c9bea58c893041f5916565140186488800037962d0c6a2de6e91d01ddd443779759259cfacae42549bb5f4fada9b8296e25849dcfbdd3efa1b28e4fbeb082f41bc678fb3e1f6d40714b5a67c40bdc118adf53c352197ef731b3757fee2741321af9e1ddbcebd1", 0x74, 0x8}, {&(0x7f00000006c0)="cc8dad1e7c6b53be777c6e9fe99dcbbbe06e78173d3c5ccd2661ac56d1bf8307a503cf5a8ac8f6785c967e38af606eb8d12bf83e009acb1e3fa2cd7d64e78d0fdfbdb131f582430d00d6142ae489be233b79c8caa5b5509f1cd10a24b8be5a0b8758f0d23ec7147c8e86896c0252a8188c83401d8b9acd98543313f98e87f655d186e7709712d805bb8baaedb33b2d3af46031e3e3e49311a64898e28d0c092abfb8f06d4886e7b51ead8a5166d28c7b2af25ab6be8064", 0xb7, 0x5}, {&(0x7f0000000780)="5a4c98de57186f01a1a8492fa92ead4ba752c0ff48fe0a3da3c0c2e4cd98faa1c5bf00df4e6fdc7f1ffdb7868fe8a4216eb9fa1d1d6963badf40e11c64a7296d1add2fd42d6bd235a8f0322ee470e510da54367f35eac40e0c6d6968559ae7f22afd74d4bbc3018752d690cf2f8c174b740b", 0x72, 0x6}, {&(0x7f0000000800)="551af39ab5fed7df8efce6e161b68e4f3fafa3edd0e37bdae1afac02de689ee5e05319cd82bc49dd39691e2828dcbe3cf5cc3a03602410fcce7e72569477e199babb171bb21d9177dc888bcc1b4d251525e4e0deeb7f3f6f4d566669fb44cf3930456bb8a31e9ee836ad4814c2e884e2d70eb289158d1bba98b5913bd47d617fcaee5cbeb0ea10db4cce71ad9b9d1222ec5e77bdf1f0fbe3365ad7c6d9548ed48c06dc25bc4f551e52bf93a5bd28c177567f5346265faff9d96e9d7b39c7a412241d109de639e439", 0xc8, 0x400}, {&(0x7f0000000900)="6ec80682a907415e55c72e5207cc008d167bea44bf92ba927da4a4ba8894cbe05c0a1ae3e9a6a2adf18f9b34be40a6bf16021b8af3db57501d293b9100fa6e464c4ba70f35edff20c017", 0x4a, 0x80000001}, {&(0x7f0000000980)="bb209133a76e5ccb7f49bb5d5c5dc1b8b71f8705bda7e2356664388b62577891d51fa717a2d14ecde15c6d59f5503a4fcb128c49490781caccb5194354c8b25d43d30d4e4e0b07985e7e88dc3a065a969c2cddc123af7613ba773923ffa919d641d4e72742f0a664799c92de0e5177c9c102922968cf0f8f38366aab771f71714c79e651b4bd41485eeb2d938f18b1c9d9f77c9012b2f07788a1bbd31e9f1736d3", 0xa1, 0x3}, {&(0x7f0000000a40)="c3c0af5a31d2a76103b9", 0xa, 0x22}], 0x2, &(0x7f0000000b40)='iocharset') r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000140)={{0x2f, @rand_addr=0x6, 0x4e23, 0x2, 'fo\x00', 0x10, 0x8, 0x27}, {@dev={0xac, 0x14, 0x14, 0x20}, 0x4e21, 0x10000, 0x3ff, 0x0, 0x101}}, 0x44) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid'}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) 07:31:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f00000004c0)) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid'}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1160.948332][T21519] Missing colon [ 1160.996385][T21521] hfs: gid requires an argument [ 1161.004341][T21521] hfs: unable to parse mount options 07:31:14 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x7ff, 0x1, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x7, 0x300) socket$kcm(0x10, 0x400800000000000, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) bpf$OBJ_PIN_MAP(0x6, 0x0, 0xfffffffffffffedc) openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) 07:31:14 executing program 1: syz_mount_image$ceph(&(0x7f00000005c0)='ceph\x00', &(0x7f0000000600)='./bus\x00', 0x6, 0x7, &(0x7f0000000a80)=[{&(0x7f0000000640)="29b639b3be916259c6b45813af9c9bea58c893041f5916565140186488800037962d0c6a2de6e91d01ddd443779759259cfacae42549bb5f4fada9b8296e25849dcfbdd3efa1b28e4fbeb082f41bc678fb3e1f6d40714b5a67c40bdc118adf53c352197ef731b3757fee2741321af9e1ddbcebd1", 0x74, 0x8}, {&(0x7f00000006c0)="cc8dad1e7c6b53be777c6e9fe99dcbbbe06e78173d3c5ccd2661ac56d1bf8307a503cf5a8ac8f6785c967e38af606eb8d12bf83e009acb1e3fa2cd7d64e78d0fdfbdb131f582430d00d6142ae489be233b79c8caa5b5509f1cd10a24b8be5a0b8758f0d23ec7147c8e86896c0252a8188c83401d8b9acd98543313f98e87f655d186e7709712d805bb8baaedb33b2d3af46031e3e3e49311a64898e28d0c092abfb8f06d4886e7b51ead8a5166d28c7b2af25ab6be8064", 0xb7, 0x5}, {&(0x7f0000000780)="5a4c98de57186f01a1a8492fa92ead4ba752c0ff48fe0a3da3c0c2e4cd98faa1c5bf00df4e6fdc7f1ffdb7868fe8a4216eb9fa1d1d6963badf40e11c64a7296d1add2fd42d6bd235a8f0322ee470e510da54367f35eac40e0c6d6968559ae7f22afd74d4bbc3018752d690cf2f8c174b740b", 0x72, 0x6}, {&(0x7f0000000800)="551af39ab5fed7df8efce6e161b68e4f3fafa3edd0e37bdae1afac02de689ee5e05319cd82bc49dd39691e2828dcbe3cf5cc3a03602410fcce7e72569477e199babb171bb21d9177dc888bcc1b4d251525e4e0deeb7f3f6f4d566669fb44cf3930456bb8a31e9ee836ad4814c2e884e2d70eb289158d1bba98b5913bd47d617fcaee5cbeb0ea10db4cce71ad9b9d1222ec5e77bdf1f0fbe3365ad7c6d9548ed48c06dc25bc4f551e52bf93a5bd28c177567f5346265faff9d96e9d7b39c7a412241d109de639e439", 0xc8, 0x400}, {&(0x7f0000000900)="6ec80682a907415e55c72e5207cc008d167bea44bf92ba927da4a4ba8894cbe05c0a1ae3e9a6a2adf18f9b34be40a6bf16021b8af3db57501d293b9100fa6e464c4ba70f35edff20c017", 0x4a, 0x80000001}, {&(0x7f0000000980)="bb209133a76e5ccb7f49bb5d5c5dc1b8b71f8705bda7e2356664388b62577891d51fa717a2d14ecde15c6d59f5503a4fcb128c49490781caccb5194354c8b25d43d30d4e4e0b07985e7e88dc3a065a969c2cddc123af7613ba773923ffa919d641d4e72742f0a664799c92de0e5177c9c102922968cf0f8f38366aab771f71714c79e651b4bd41485eeb2d938f18b1c9d9f77c9012b2f07788a1bbd31e9f1736d3", 0xa1, 0x3}, {&(0x7f0000000a40)="c3c0af5a31d2a76103b9", 0xa, 0x22}], 0x2, &(0x7f0000000b40)='iocharset') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r0}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) [ 1161.073661][T21525] IPVS: set_ctl: invalid protocol: 47 0.0.0.6:20003 [ 1161.107472][T21524] Missing colon 07:31:14 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, r2, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)) [ 1161.156195][T21528] hfs: unable to parse mount options 07:31:14 executing program 3: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, r2, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)) [ 1161.207209][T21532] Missing colon 07:31:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x7ff, 0x1, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x7, 0x300) socket$kcm(0x10, 0x400800000000000, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) bpf$OBJ_PIN_MAP(0x6, 0x0, 0xfffffffffffffedc) openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0) r2 = socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffeae) sendmsg(r2, &(0x7f0000000140)={&(0x7f0000000200)=@isdn={0x22, 0x1f, 0xffffffff, 0x400, 0x4}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000006c0)="5ea03f6db511aee466448c41d0a37c5d52fbf6d123b2238bc0dc67ffb8a030dd7d9264060255082b5024d1bd6e117d7a20ca56078066e91049b134eb2db929be3f0ac2f70eacf24ae891471c290affb67848907db14e21832c3df1d097ecf14e120ecc990d234042832cc0352f4c22b3828a9ad20ee214973a95bd34110513eb0b903c83d4b8aa755076804cf502013c1bbace98bc821e5a8ba782e18f8fa11b088b70db05e454dd159d018ed06d197dd6014565077d4ebfb8b7db6d35f609ed05ffbcf3380687357f1a593b6f2842e76ff1df4bd5ae29584f89e9d2e50ccbb2964e2e6d3487a509a21e1f6c0ab2dcd9f70777a5c1d58dbf37d5ad66d553898b5620b1e35eb2a96ec010bb87957b6193071706744e312fff95abe536818207e41f7af43e08cca42680fadb739d70aafbeafa7fae70e4526c97e9edcac5648e4c38e10efd34d9f09592c73542bf127a1e68cf8fc3e58e78142b5e5fbbee0175350ab1a8aeedc6c8072ccaa476da314b578854756bb2db47caff231a7f64c51d1d7b4ed1e7cde59355285ef2c2be4ca6f0f6d01dc2d9845505f3a97a57f240c0b0f18fb4936dbb6cf7b6dbf6ec28e61a91ae6e748d0adec1c02c7a39019853b7497e5c3fdd571058f3e648b9f14080442b7279b28de971b6c8b97f1cea66a08bf83bee0707cae6972648a7f3924d63fd69ed03a13aaeba0d9e3bb239544359153fa124e70f873f9d10c07a5a0b58e82536153849350203d848998d61cbaa4f67dc73c84dbcd45939a3f01839e0897a3271118e304694db3ab806e05d206bd3c42dc79be167c9c297559d9a85d5eb04369c534360045b1a80e28d1466705873e3d8bfa73c44d59473df58b8a0305e6a5ec7300183cc60115288e393ca5d160a0fc8eaec5a77c0ba0798eed1e18890e2403ee8d156514eb6f5dc075d4a1f7ce70ae6fab8c82c6ecbcf3e973bc6a461f2f739f9820d66e28f3e9834a7ac8ed81a352c9f7a0882b14b2044ededaf694eba063ad3192f4dbf6ba79288a47ccbf6546c4fbbaefc864694e7063e39cb12ec68dca7b20986c48ae94022cdcb888222ee7f05f55ddea71f0298223b3c4109c15dd7ec41e78aef8dd5ff55c89ce7900261d62b35d12b813b8a385863f3c9d1f4ed37d7cd5314226afdb2892ddaeb1eec542cc8c040fc64cd3ae4dcd7264d68d247acbb353e40a33d5682ce2a4a005a2975908cbd0526beb6048840f3499cfcebba06eaf0c51c8b760593098a3def21b3664e7d42253f8c990538d382bf0768cdc106fac3699bcb5b12279f81dc9ba6ed1e2f7820f6cf8a2b3e4c88a33d9f0a32f60673b5897cadbbe7dffb9cf7f6b5a5d62701eba230fb2daa966a63d91e86c02472bd8114e5ba5df8152067086c142e6cd88289a501fc3353c1d0f17a663b179c446220d970d50a9c9adbb0b990be52ad19cd36669df47ff6e1f6fec4b7b1693c802d736aebe985e0c3c59c753ed95d79a7564880c4e2ffe5c9e59e818d2810468c48a4e75f15f3f252f2d780dd30717fe572c5d55adf090223fb30216c3882e9be19cb627aab1fdad81f8f117a90c2e7874edf1c4dc8e2da674348855659434eaba5c5063a29c28f4d22ce5515464b53967ab33d82f0e5afa98322c31e789be5d7600c726bd467d3be3eb4e0df733b91eecd95a5d1648ef268c43906b187ab24bb83bc80fa2ba4ab21d99c0aadf87d15cec51bf2cd52412ec638b43c27551f039e58026e6e910c7f327afe2e363491cfed5caadc8ca674659004f24991fdf76faac054dff64fb2282fc92d3b9ae32222833f1ae905dfa1dada3116765ef2b04ae6124f44cc7f83bd8f159eaa5290cc9e691fa77bec9c35a625b1b24cde8c9363b37b6f77ce844ea77752891b4c837c7c9648f7a16da6aadaf8912ba392c9984d26977c4b99e5c94925f0c6b9a48f2701eeb477aa0a99adb7fd145cd01b3cee9ad3c835690cda9ee1302fdf301558bb1979e177f18876b3fbe7b01597260a33822a63cdc760edee9839d75e0de20acdc8ae98a008d7390e4bb095650149b1bae84d240bd6480fbb10c1930f3a61dbfc3cb17888e33fb12f2dec1523380699b28300bf8b377e4357d5385176a35edbbb6e81e17e42fb07964452b53a069704f597cab1c646a8e8b99c0411e18def7e1c26e7cab72369228dfeb0d306cd46cdd9299538c89697c1c681d577290c2b03c9d84cd1b5803ff9291a28f3efbc3112b53e5cea348d364a954ac78db91e610df86be53c20707401d70f7768cdf0566420c1dfb7216877784244b5a84abc61e577b11b5dfd194018dbaa4024b57e6b0dcba72f621f62938f7a717c9a899aaa78b595f01c48f94c0bbf68c7cfb16c59269f48611dc9d7077b6805edbe30f2c7988a18f5ef3928a769f011936af9cb4665f48ce17afa1bb3f614e76b40a7e0920b9942362c41589f2be923530a186693a429a8e2767ec30d02407d4fbb6a397f52ec48fdb3fc0d2863f301585a14941cfac093cf8e53e91762db548306961979d396e4645f5698aa36db22603d1893149ba2d7aaa44bb14e0eceafd84cddb3c5c3e2a8eeb02a96e9d9f08db989b450614b0767314e4024114c785c95272226f1c2e2a29a07c7c133abaf254fb9d64a1c597ca32c3a1b17bf262907d9a5a468d37986a300f9a1274718521d76cc1fa8ae122f5dc46ba1c998c3d66bbfdece070f37ac35c7d7de0bffc8369f222fe768273edb69115f94177e9ab237ba50eafdefd5a2369059be377db15661961961c3bc60e6b1af713bd20d70b315025a249d5a6d67e340582404b561ae11fcc711c21c80a56d0a6b964d333e0c1a53333a2ebf4ebda28a59680639c0fd282d64539143b2d416accb7b5cfa16fb2dd9b767f79fe9c26f2b70972b2225ae8beae908dfcb34bbe30870369ea766479db570787a6e11d7544f32888b637e3cbbc4fc85e34d7847e26779e8a8d940ae28de2f2d122c1dba8948af913b2ba890cb12cf2db92ae75aac53614d6faaed47b4373147c6c93880646ee35d85394d25d9dadf73ea35ada21cdbc89038e90e9a28949fd84bac77ea7b2f79ece1c3c2defe5faf9b001ac4750920fc6414569413fd2cdb4e49751fa9c1a531d0081856aa2a9f884040610f9782eeb2c135afc0f60c09e1d5c3a83311010ead8b7bebe91bf339b7d88fab261596465fbbb8942fd32aac8661bb3ad21696895365e258f2a6d4e9049f93545e971fc053317082a2c6ebe65e571b29cdcbca06e5f422c6ea288f98d282ad5c9475a3e9258b4a21360d19cb91c99aeb6476f21049c8d6c9918a9ba7ced60b1f97b9b9cacef6958da3fb8b762f35043539c145956487110ccd420783f3c4490cecb089179c99a89e07fc14d2a8e8a78cc1cbbf0caaf9f8a6850fa8f150c45b616c102a09b995ac9408fdfd26b79339ad175691cc065f7911d99c53b249f03a96b3df1cca6f9dfd2d3c1e732681d58cc2fc671010e7bd98c006ba63b703266aa2f1c3d6fbc148902e425d83d044f014b9e7b3977b8fda094e02dd6dd8298983d5d891d66db077233fc155dad208bfe7c6585bdc6d246bba81cacff55994ee88f9163b27f51d6ae47d0b296124d3018f69f79528797e8aaf21d8035c044821137b0f7e7b3b41b8019379002ae9bc70dc1bc377b6fc0e2a40accf480ae0dc53e61a91d1815ea796fc14d6abddcee1fd965adc3a441333d430568bcb29f0cac078b70a4f6d1011c1822708fb1bbeeaea6433cf5cdcf9aec7bbce4c92e6fdda88b3dc48a4d42f4348a05fee23c41869ca326d39c0605d9144f82bd0c3c2f9ac9ae0b1f5fabe0ab5af39babf027a83df5b1c58513d27cb5babc9a5be073043543bff731da9bb715e57678507baf194fec9efa3235631b9594682dd531c3762432e25c25c048e600cc7c318e82b720db17436fbc054c04f59923ae61ec0b4896d08daab3b617bd8d239c24e95c8fcd1a7dd64a8a3d7e158c626833a2735c9e96514639f007983da3bb43a6f18e40d3eda0cc9468d118d28c6bda3ebae6c3ae2c14b1b02305abd16b7c6be707ffaf59142988eb931275bd4c38aefefbbaa95e16d7551f5f1fcfa9744a357d21c76b28747e5e94683d455530433876d509793ed409847f8a972450285f9e9f2dc665e78c7747418523bb51ef8191231e989ca93ef75e9ca27f38a2e5327d29c265c39f12fb1d01a723a902292c6bc06fdc6856d4829680909db55c4650449d0a2d2dad92cfbc8c03fdcb5656a56fded95b0ac41595a2a5bb34d5feb4e06da8adb5143eef67cdc3d18edd095c086d99cb43cddbbfeeb0beadadc1e30ec57bf760592e6365ffacbd6134b7262966af9c808f980fff81280566c79d3a2a15654c597aa050dda7ace4b5298f512b445023d4d86bc37c85ee1a2d7637f3ea0eafd6440893f43a2a912735d0dc8e2827148893f7554897fcb91a4f5581d793fa707fa181dcf69e3fddf498a19767922f4c52fd6797bfba85a61f9c5fe10970b06c7006d7b804f5d1db40b6f606f532cc5a6b93be6473bcbad8f06ead3995cb5f42ee8ddc658ac9085d0c6046b07be03837d5d68504c04b2a769db69e04aa1e414eec40118856f58ac5d3765e5d5038b20d2966389d0b462dfd71065140bf8ae0bb6eb105ac8160c8cc7641b14aaf0304731ab4d9d4bef89d62dd137d7f88645f941999e2fbfbd171a445c2702a87adcb5fd7d7e36d53b715e6ee87fcebdd0b9fef00182fa8e7ec8e7b5a3ac9d332ce92334a8e1ce0d493cff3c2a4fe1f902da785deb68bf936eabfe59a2f698b2d8d0dbd11c25f413ad4b7c554ed5d9e69a1c44c0dd523b47fc66e474357bd6b1e49fc2e12e30e206347d479ce0c20ef4b12e5d63de14e4b7550772a1ef0b5327d755aef1766da85e429a7920e4652d772619ea3526b330778ad35966c12e45a85ce6a5e3e99372a8c621e17ac2c3ff024c625a5599d41ad794e99ceeecb0bf334fd56b823e5b9406c6089fa406aaabe75afd7413affdc1019729d6f72a4b1a330412c03d9f75dbedb88bf556ee57a642fd1802e35807878f7aa15af0a00bc8fa8a4d01ff3e60249d07e780244d387cc60d7f25869f50580f0136391faec535332727b7ec85b12e3be7d8f34369f00b888133c3ad0ffa24bd03c5183d55172076b989b4151227467b915ab6e8347e15c99f2f9051d6ae0b2b72a717536899473b7c04160cc8d6d23a3f0ee63ae0ae4f79523af48779d836f0e0ae4b92ee78b820a9f6319ab064d11b7fb3e91579528a91c7c2521332ffaceb00ebaded7ef22d0ff9986273759b08b9f75565fe5c194bbfe704eda0fc0662db8cc3002b05dc39792540278a2c12501680ef4b95b3eac0573e559c6cf0badbe364e3bcaa14661afe1320a32d4e9644fdcd44b9dce2fee476e8f840a91a66cd877d3e5bbb5b595e654580955f4ba8548b41220a355a805669de9f3bc50157e594f5b444b88a320d80522e51bce929200d71e10e4a85c3d12ee133dda3fcdf7a454773a0575f7d9bfcb8c8646ffbad451446daf3ea742c0fa6bbb2ca4db442e60492ac9e131037278fa5552c0ed00c84469cd11600d3365617f57af4178fc264500327c48ae67de27c62766f9d6848e57f2ce0eb75e1cf72bafb21541c0370f73fc77e0d8b0b11056362a3936e38271259377d40fbc257d8c72b3e583fc6b0e20420dbc99a7932cb305fa9e61bd0de0d9758d35fe0ee13d0eaa782a3059e10caa61df3903aa1061298aced4712d998181e7edd03a11041de4018fe56cae17e0dced027", 0xff8}], 0x1}, 0x50) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0\x00', r0}, 0x10) 07:31:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f00000004c0)) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid'}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1161.297670][T21536] hfs: unable to parse mount options 07:31:14 executing program 1: syz_mount_image$ceph(&(0x7f00000005c0)='ceph\x00', &(0x7f0000000600)='./bus\x00', 0x6, 0x7, &(0x7f0000000a80)=[{&(0x7f0000000640)="29b639b3be916259c6b45813af9c9bea58c893041f5916565140186488800037962d0c6a2de6e91d01ddd443779759259cfacae42549bb5f4fada9b8296e25849dcfbdd3efa1b28e4fbeb082f41bc678fb3e1f6d40714b5a67c40bdc118adf53c352197ef731b3757fee2741321af9e1ddbcebd1", 0x74, 0x8}, {&(0x7f00000006c0)="cc8dad1e7c6b53be777c6e9fe99dcbbbe06e78173d3c5ccd2661ac56d1bf8307a503cf5a8ac8f6785c967e38af606eb8d12bf83e009acb1e3fa2cd7d64e78d0fdfbdb131f582430d00d6142ae489be233b79c8caa5b5509f1cd10a24b8be5a0b8758f0d23ec7147c8e86896c0252a8188c83401d8b9acd98543313f98e87f655d186e7709712d805bb8baaedb33b2d3af46031e3e3e49311a64898e28d0c092abfb8f06d4886e7b51ead8a5166d28c7b2af25ab6be8064", 0xb7, 0x5}, {&(0x7f0000000780)="5a4c98de57186f01a1a8492fa92ead4ba752c0ff48fe0a3da3c0c2e4cd98faa1c5bf00df4e6fdc7f1ffdb7868fe8a4216eb9fa1d1d6963badf40e11c64a7296d1add2fd42d6bd235a8f0322ee470e510da54367f35eac40e0c6d6968559ae7f22afd74d4bbc3018752d690cf2f8c174b740b", 0x72, 0x6}, {&(0x7f0000000800)="551af39ab5fed7df8efce6e161b68e4f3fafa3edd0e37bdae1afac02de689ee5e05319cd82bc49dd39691e2828dcbe3cf5cc3a03602410fcce7e72569477e199babb171bb21d9177dc888bcc1b4d251525e4e0deeb7f3f6f4d566669fb44cf3930456bb8a31e9ee836ad4814c2e884e2d70eb289158d1bba98b5913bd47d617fcaee5cbeb0ea10db4cce71ad9b9d1222ec5e77bdf1f0fbe3365ad7c6d9548ed48c06dc25bc4f551e52bf93a5bd28c177567f5346265faff9d96e9d7b39c7a412241d109de639e439", 0xc8, 0x400}, {&(0x7f0000000900)="6ec80682a907415e55c72e5207cc008d167bea44bf92ba927da4a4ba8894cbe05c0a1ae3e9a6a2adf18f9b34be40a6bf16021b8af3db57501d293b9100fa6e464c4ba70f35edff20c017", 0x4a, 0x80000001}, {&(0x7f0000000980)="bb209133a76e5ccb7f49bb5d5c5dc1b8b71f8705bda7e2356664388b62577891d51fa717a2d14ecde15c6d59f5503a4fcb128c49490781caccb5194354c8b25d43d30d4e4e0b07985e7e88dc3a065a969c2cddc123af7613ba773923ffa919d641d4e72742f0a664799c92de0e5177c9c102922968cf0f8f38366aab771f71714c79e651b4bd41485eeb2d938f18b1c9d9f77c9012b2f07788a1bbd31e9f1736d3", 0xa1, 0x3}, {&(0x7f0000000a40)="c3c0af5a31d2a76103b9", 0xa, 0x22}], 0x2, &(0x7f0000000b40)='iocharset') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r0}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) [ 1161.424515][T21630] hfs: unable to parse mount options [ 1161.527013][T21645] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 07:31:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f00000004c0)) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid'}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1161.585571][T21652] Missing colon 07:31:14 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x7ff, 0x1, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x7, 0x300) socket$kcm(0x10, 0x400800000000000, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) bpf$OBJ_PIN_MAP(0x6, 0x0, 0xfffffffffffffedc) openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) 07:31:14 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) sendfile(r2, r2, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)) [ 1161.699775][T21655] hfs: unable to parse mount options 07:31:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x7ff, 0x1, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x7, 0x300) socket$kcm(0x10, 0x400800000000000, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) bpf$OBJ_PIN_MAP(0x6, 0x0, 0xfffffffffffffedc) openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0) r2 = socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffeae) sendmsg(r2, &(0x7f0000000140)={&(0x7f0000000200)=@isdn={0x22, 0x1f, 0xffffffff, 0x400, 0x4}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000006c0)="5ea03f6db511aee466448c41d0a37c5d52fbf6d123b2238bc0dc67ffb8a030dd7d9264060255082b5024d1bd6e117d7a20ca56078066e91049b134eb2db929be3f0ac2f70eacf24ae891471c290affb67848907db14e21832c3df1d097ecf14e120ecc990d234042832cc0352f4c22b3828a9ad20ee214973a95bd34110513eb0b903c83d4b8aa755076804cf502013c1bbace98bc821e5a8ba782e18f8fa11b088b70db05e454dd159d018ed06d197dd6014565077d4ebfb8b7db6d35f609ed05ffbcf3380687357f1a593b6f2842e76ff1df4bd5ae29584f89e9d2e50ccbb2964e2e6d3487a509a21e1f6c0ab2dcd9f70777a5c1d58dbf37d5ad66d553898b5620b1e35eb2a96ec010bb87957b6193071706744e312fff95abe536818207e41f7af43e08cca42680fadb739d70aafbeafa7fae70e4526c97e9edcac5648e4c38e10efd34d9f09592c73542bf127a1e68cf8fc3e58e78142b5e5fbbee0175350ab1a8aeedc6c8072ccaa476da314b578854756bb2db47caff231a7f64c51d1d7b4ed1e7cde59355285ef2c2be4ca6f0f6d01dc2d9845505f3a97a57f240c0b0f18fb4936dbb6cf7b6dbf6ec28e61a91ae6e748d0adec1c02c7a39019853b7497e5c3fdd571058f3e648b9f14080442b7279b28de971b6c8b97f1cea66a08bf83bee0707cae6972648a7f3924d63fd69ed03a13aaeba0d9e3bb239544359153fa124e70f873f9d10c07a5a0b58e82536153849350203d848998d61cbaa4f67dc73c84dbcd45939a3f01839e0897a3271118e304694db3ab806e05d206bd3c42dc79be167c9c297559d9a85d5eb04369c534360045b1a80e28d1466705873e3d8bfa73c44d59473df58b8a0305e6a5ec7300183cc60115288e393ca5d160a0fc8eaec5a77c0ba0798eed1e18890e2403ee8d156514eb6f5dc075d4a1f7ce70ae6fab8c82c6ecbcf3e973bc6a461f2f739f9820d66e28f3e9834a7ac8ed81a352c9f7a0882b14b2044ededaf694eba063ad3192f4dbf6ba79288a47ccbf6546c4fbbaefc864694e7063e39cb12ec68dca7b20986c48ae94022cdcb888222ee7f05f55ddea71f0298223b3c4109c15dd7ec41e78aef8dd5ff55c89ce7900261d62b35d12b813b8a385863f3c9d1f4ed37d7cd5314226afdb2892ddaeb1eec542cc8c040fc64cd3ae4dcd7264d68d247acbb353e40a33d5682ce2a4a005a2975908cbd0526beb6048840f3499cfcebba06eaf0c51c8b760593098a3def21b3664e7d42253f8c990538d382bf0768cdc106fac3699bcb5b12279f81dc9ba6ed1e2f7820f6cf8a2b3e4c88a33d9f0a32f60673b5897cadbbe7dffb9cf7f6b5a5d62701eba230fb2daa966a63d91e86c02472bd8114e5ba5df8152067086c142e6cd88289a501fc3353c1d0f17a663b179c446220d970d50a9c9adbb0b990be52ad19cd36669df47ff6e1f6fec4b7b1693c802d736aebe985e0c3c59c753ed95d79a7564880c4e2ffe5c9e59e818d2810468c48a4e75f15f3f252f2d780dd30717fe572c5d55adf090223fb30216c3882e9be19cb627aab1fdad81f8f117a90c2e7874edf1c4dc8e2da674348855659434eaba5c5063a29c28f4d22ce5515464b53967ab33d82f0e5afa98322c31e789be5d7600c726bd467d3be3eb4e0df733b91eecd95a5d1648ef268c43906b187ab24bb83bc80fa2ba4ab21d99c0aadf87d15cec51bf2cd52412ec638b43c27551f039e58026e6e910c7f327afe2e363491cfed5caadc8ca674659004f24991fdf76faac054dff64fb2282fc92d3b9ae32222833f1ae905dfa1dada3116765ef2b04ae6124f44cc7f83bd8f159eaa5290cc9e691fa77bec9c35a625b1b24cde8c9363b37b6f77ce844ea77752891b4c837c7c9648f7a16da6aadaf8912ba392c9984d26977c4b99e5c94925f0c6b9a48f2701eeb477aa0a99adb7fd145cd01b3cee9ad3c835690cda9ee1302fdf301558bb1979e177f18876b3fbe7b01597260a33822a63cdc760edee9839d75e0de20acdc8ae98a008d7390e4bb095650149b1bae84d240bd6480fbb10c1930f3a61dbfc3cb17888e33fb12f2dec1523380699b28300bf8b377e4357d5385176a35edbbb6e81e17e42fb07964452b53a069704f597cab1c646a8e8b99c0411e18def7e1c26e7cab72369228dfeb0d306cd46cdd9299538c89697c1c681d577290c2b03c9d84cd1b5803ff9291a28f3efbc3112b53e5cea348d364a954ac78db91e610df86be53c20707401d70f7768cdf0566420c1dfb7216877784244b5a84abc61e577b11b5dfd194018dbaa4024b57e6b0dcba72f621f62938f7a717c9a899aaa78b595f01c48f94c0bbf68c7cfb16c59269f48611dc9d7077b6805edbe30f2c7988a18f5ef3928a769f011936af9cb4665f48ce17afa1bb3f614e76b40a7e0920b9942362c41589f2be923530a186693a429a8e2767ec30d02407d4fbb6a397f52ec48fdb3fc0d2863f301585a14941cfac093cf8e53e91762db548306961979d396e4645f5698aa36db22603d1893149ba2d7aaa44bb14e0eceafd84cddb3c5c3e2a8eeb02a96e9d9f08db989b450614b0767314e4024114c785c95272226f1c2e2a29a07c7c133abaf254fb9d64a1c597ca32c3a1b17bf262907d9a5a468d37986a300f9a1274718521d76cc1fa8ae122f5dc46ba1c998c3d66bbfdece070f37ac35c7d7de0bffc8369f222fe768273edb69115f94177e9ab237ba50eafdefd5a2369059be377db15661961961c3bc60e6b1af713bd20d70b315025a249d5a6d67e340582404b561ae11fcc711c21c80a56d0a6b964d333e0c1a53333a2ebf4ebda28a59680639c0fd282d64539143b2d416accb7b5cfa16fb2dd9b767f79fe9c26f2b70972b2225ae8beae908dfcb34bbe30870369ea766479db570787a6e11d7544f32888b637e3cbbc4fc85e34d7847e26779e8a8d940ae28de2f2d122c1dba8948af913b2ba890cb12cf2db92ae75aac53614d6faaed47b4373147c6c93880646ee35d85394d25d9dadf73ea35ada21cdbc89038e90e9a28949fd84bac77ea7b2f79ece1c3c2defe5faf9b001ac4750920fc6414569413fd2cdb4e49751fa9c1a531d0081856aa2a9f884040610f9782eeb2c135afc0f60c09e1d5c3a83311010ead8b7bebe91bf339b7d88fab261596465fbbb8942fd32aac8661bb3ad21696895365e258f2a6d4e9049f93545e971fc053317082a2c6ebe65e571b29cdcbca06e5f422c6ea288f98d282ad5c9475a3e9258b4a21360d19cb91c99aeb6476f21049c8d6c9918a9ba7ced60b1f97b9b9cacef6958da3fb8b762f35043539c145956487110ccd420783f3c4490cecb089179c99a89e07fc14d2a8e8a78cc1cbbf0caaf9f8a6850fa8f150c45b616c102a09b995ac9408fdfd26b79339ad175691cc065f7911d99c53b249f03a96b3df1cca6f9dfd2d3c1e732681d58cc2fc671010e7bd98c006ba63b703266aa2f1c3d6fbc148902e425d83d044f014b9e7b3977b8fda094e02dd6dd8298983d5d891d66db077233fc155dad208bfe7c6585bdc6d246bba81cacff55994ee88f9163b27f51d6ae47d0b296124d3018f69f79528797e8aaf21d8035c044821137b0f7e7b3b41b8019379002ae9bc70dc1bc377b6fc0e2a40accf480ae0dc53e61a91d1815ea796fc14d6abddcee1fd965adc3a441333d430568bcb29f0cac078b70a4f6d1011c1822708fb1bbeeaea6433cf5cdcf9aec7bbce4c92e6fdda88b3dc48a4d42f4348a05fee23c41869ca326d39c0605d9144f82bd0c3c2f9ac9ae0b1f5fabe0ab5af39babf027a83df5b1c58513d27cb5babc9a5be073043543bff731da9bb715e57678507baf194fec9efa3235631b9594682dd531c3762432e25c25c048e600cc7c318e82b720db17436fbc054c04f59923ae61ec0b4896d08daab3b617bd8d239c24e95c8fcd1a7dd64a8a3d7e158c626833a2735c9e96514639f007983da3bb43a6f18e40d3eda0cc9468d118d28c6bda3ebae6c3ae2c14b1b02305abd16b7c6be707ffaf59142988eb931275bd4c38aefefbbaa95e16d7551f5f1fcfa9744a357d21c76b28747e5e94683d455530433876d509793ed409847f8a972450285f9e9f2dc665e78c7747418523bb51ef8191231e989ca93ef75e9ca27f38a2e5327d29c265c39f12fb1d01a723a902292c6bc06fdc6856d4829680909db55c4650449d0a2d2dad92cfbc8c03fdcb5656a56fded95b0ac41595a2a5bb34d5feb4e06da8adb5143eef67cdc3d18edd095c086d99cb43cddbbfeeb0beadadc1e30ec57bf760592e6365ffacbd6134b7262966af9c808f980fff81280566c79d3a2a15654c597aa050dda7ace4b5298f512b445023d4d86bc37c85ee1a2d7637f3ea0eafd6440893f43a2a912735d0dc8e2827148893f7554897fcb91a4f5581d793fa707fa181dcf69e3fddf498a19767922f4c52fd6797bfba85a61f9c5fe10970b06c7006d7b804f5d1db40b6f606f532cc5a6b93be6473bcbad8f06ead3995cb5f42ee8ddc658ac9085d0c6046b07be03837d5d68504c04b2a769db69e04aa1e414eec40118856f58ac5d3765e5d5038b20d2966389d0b462dfd71065140bf8ae0bb6eb105ac8160c8cc7641b14aaf0304731ab4d9d4bef89d62dd137d7f88645f941999e2fbfbd171a445c2702a87adcb5fd7d7e36d53b715e6ee87fcebdd0b9fef00182fa8e7ec8e7b5a3ac9d332ce92334a8e1ce0d493cff3c2a4fe1f902da785deb68bf936eabfe59a2f698b2d8d0dbd11c25f413ad4b7c554ed5d9e69a1c44c0dd523b47fc66e474357bd6b1e49fc2e12e30e206347d479ce0c20ef4b12e5d63de14e4b7550772a1ef0b5327d755aef1766da85e429a7920e4652d772619ea3526b330778ad35966c12e45a85ce6a5e3e99372a8c621e17ac2c3ff024c625a5599d41ad794e99ceeecb0bf334fd56b823e5b9406c6089fa406aaabe75afd7413affdc1019729d6f72a4b1a330412c03d9f75dbedb88bf556ee57a642fd1802e35807878f7aa15af0a00bc8fa8a4d01ff3e60249d07e780244d387cc60d7f25869f50580f0136391faec535332727b7ec85b12e3be7d8f34369f00b888133c3ad0ffa24bd03c5183d55172076b989b4151227467b915ab6e8347e15c99f2f9051d6ae0b2b72a717536899473b7c04160cc8d6d23a3f0ee63ae0ae4f79523af48779d836f0e0ae4b92ee78b820a9f6319ab064d11b7fb3e91579528a91c7c2521332ffaceb00ebaded7ef22d0ff9986273759b08b9f75565fe5c194bbfe704eda0fc0662db8cc3002b05dc39792540278a2c12501680ef4b95b3eac0573e559c6cf0badbe364e3bcaa14661afe1320a32d4e9644fdcd44b9dce2fee476e8f840a91a66cd877d3e5bbb5b595e654580955f4ba8548b41220a355a805669de9f3bc50157e594f5b444b88a320d80522e51bce929200d71e10e4a85c3d12ee133dda3fcdf7a454773a0575f7d9bfcb8c8646ffbad451446daf3ea742c0fa6bbb2ca4db442e60492ac9e131037278fa5552c0ed00c84469cd11600d3365617f57af4178fc264500327c48ae67de27c62766f9d6848e57f2ce0eb75e1cf72bafb21541c0370f73fc77e0d8b0b11056362a3936e38271259377d40fbc257d8c72b3e583fc6b0e20420dbc99a7932cb305fa9e61bd0de0d9758d35fe0ee13d0eaa782a3059e10caa61df3903aa1061298aced4712d998181e7edd03a11041de4018fe56cae17e0dced027", 0xff8}], 0x1}, 0x50) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0\x00', r0}, 0x10) [ 1161.760089][T21658] hfs: unable to parse mount options 07:31:14 executing program 1: syz_mount_image$ceph(&(0x7f00000005c0)='ceph\x00', &(0x7f0000000600)='./bus\x00', 0x6, 0x7, &(0x7f0000000a80)=[{&(0x7f0000000640)="29b639b3be916259c6b45813af9c9bea58c893041f5916565140186488800037962d0c6a2de6e91d01ddd443779759259cfacae42549bb5f4fada9b8296e25849dcfbdd3efa1b28e4fbeb082f41bc678fb3e1f6d40714b5a67c40bdc118adf53c352197ef731b3757fee2741321af9e1ddbcebd1", 0x74, 0x8}, {&(0x7f00000006c0)="cc8dad1e7c6b53be777c6e9fe99dcbbbe06e78173d3c5ccd2661ac56d1bf8307a503cf5a8ac8f6785c967e38af606eb8d12bf83e009acb1e3fa2cd7d64e78d0fdfbdb131f582430d00d6142ae489be233b79c8caa5b5509f1cd10a24b8be5a0b8758f0d23ec7147c8e86896c0252a8188c83401d8b9acd98543313f98e87f655d186e7709712d805bb8baaedb33b2d3af46031e3e3e49311a64898e28d0c092abfb8f06d4886e7b51ead8a5166d28c7b2af25ab6be8064", 0xb7, 0x5}, {&(0x7f0000000780)="5a4c98de57186f01a1a8492fa92ead4ba752c0ff48fe0a3da3c0c2e4cd98faa1c5bf00df4e6fdc7f1ffdb7868fe8a4216eb9fa1d1d6963badf40e11c64a7296d1add2fd42d6bd235a8f0322ee470e510da54367f35eac40e0c6d6968559ae7f22afd74d4bbc3018752d690cf2f8c174b740b", 0x72, 0x6}, {&(0x7f0000000800)="551af39ab5fed7df8efce6e161b68e4f3fafa3edd0e37bdae1afac02de689ee5e05319cd82bc49dd39691e2828dcbe3cf5cc3a03602410fcce7e72569477e199babb171bb21d9177dc888bcc1b4d251525e4e0deeb7f3f6f4d566669fb44cf3930456bb8a31e9ee836ad4814c2e884e2d70eb289158d1bba98b5913bd47d617fcaee5cbeb0ea10db4cce71ad9b9d1222ec5e77bdf1f0fbe3365ad7c6d9548ed48c06dc25bc4f551e52bf93a5bd28c177567f5346265faff9d96e9d7b39c7a412241d109de639e439", 0xc8, 0x400}, {&(0x7f0000000900)="6ec80682a907415e55c72e5207cc008d167bea44bf92ba927da4a4ba8894cbe05c0a1ae3e9a6a2adf18f9b34be40a6bf16021b8af3db57501d293b9100fa6e464c4ba70f35edff20c017", 0x4a, 0x80000001}, {&(0x7f0000000980)="bb209133a76e5ccb7f49bb5d5c5dc1b8b71f8705bda7e2356664388b62577891d51fa717a2d14ecde15c6d59f5503a4fcb128c49490781caccb5194354c8b25d43d30d4e4e0b07985e7e88dc3a065a969c2cddc123af7613ba773923ffa919d641d4e72742f0a664799c92de0e5177c9c102922968cf0f8f38366aab771f71714c79e651b4bd41485eeb2d938f18b1c9d9f77c9012b2f07788a1bbd31e9f1736d3", 0xa1, 0x3}, {&(0x7f0000000a40)="c3c0af5a31d2a76103b9", 0xa, 0x22}], 0x2, &(0x7f0000000b40)='iocharset') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r0}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) [ 1161.928120][T21684] Missing colon [ 1161.996277][T21713] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 07:31:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1162.050587][T21743] hfs: unable to parse mount options 07:31:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) 07:31:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) pipe2$9p(&(0x7f0000000040), 0x84000) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1162.210922][T21776] hfs: unable to parse mount options 07:31:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x7ff, 0x1, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x7, 0x300) socket$kcm(0x10, 0x400800000000000, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) bpf$OBJ_PIN_MAP(0x6, 0x0, 0xfffffffffffffedc) openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0) r2 = socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffeae) sendmsg(r2, &(0x7f0000000140)={&(0x7f0000000200)=@isdn={0x22, 0x1f, 0xffffffff, 0x400, 0x4}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000006c0)="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", 0xff8}], 0x1}, 0x50) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0\x00', r0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0xffffffffffffffff, r0, 0x0, 0x274, &(0x7f0000001700)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0xffffffffffffffff}, 0x30) 07:31:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x7ff, 0x1, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x7, 0x300) socket$kcm(0x10, 0x400800000000000, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) bpf$OBJ_PIN_MAP(0x6, 0x0, 0xfffffffffffffedc) openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0) r2 = socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffeae) sendmsg(r2, &(0x7f0000000140)={&(0x7f0000000200)=@isdn={0x22, 0x1f, 0xffffffff, 0x400, 0x4}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000006c0)="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", 0xff8}], 0x1}, 0x50) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0\x00', r0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0xffffffffffffffff, r0, 0x0, 0x274, &(0x7f0000001700)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x1c7b, 0x7, 0x80, 0x2, 0x0, 0x4, 0x12000, 0x4, 0x2, 0x7b, 0xffffffffffff0064, 0xcce, 0x3, 0x7ff, 0x2, 0x4, 0x0, 0x8000, 0x2, 0x8001, 0x0, 0xfff, 0x80, 0x1000, 0x8, 0x7f729b81, 0x4, 0xd4, 0x2fe5, 0xfffffffffffffff8, 0x6, 0x0, 0x7, 0x1, 0xbbd7, 0x7, 0x0, 0x50, 0x0, @perf_bp={&(0x7f0000000380), 0x7}, 0x2010, 0x1, 0x97, 0x1, 0x7ff, 0x93c}, r4, 0x0, r0, 0x0) [ 1162.293769][T21780] hfs: gid requires an argument 07:31:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1162.338963][T21780] hfs: unable to parse mount options 07:31:15 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r0}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) [ 1162.440578][T21784] hfs: can't find a HFS filesystem on dev loop2 07:31:15 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) sendfile(r2, r2, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)) [ 1162.486751][T21820] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1162.532620][T21790] hfs: unable to parse mount options 07:31:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) pipe2$9p(&(0x7f0000000040), 0x84000) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 07:31:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1162.593630][T21865] hfs: unable to parse mount options 07:31:15 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r0}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) 07:31:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x7ff, 0x1, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x7, 0x300) socket$kcm(0x10, 0x400800000000000, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) bpf$OBJ_PIN_MAP(0x6, 0x0, 0xfffffffffffffedc) openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0) r2 = socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffeae) sendmsg(r2, &(0x7f0000000140)={&(0x7f0000000200)=@isdn={0x22, 0x1f, 0xffffffff, 0x400, 0x4}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000006c0)="5ea03f6db511aee466448c41d0a37c5d52fbf6d123b2238bc0dc67ffb8a030dd7d9264060255082b5024d1bd6e117d7a20ca56078066e91049b134eb2db929be3f0ac2f70eacf24ae891471c290affb67848907db14e21832c3df1d097ecf14e120ecc990d234042832cc0352f4c22b3828a9ad20ee214973a95bd34110513eb0b903c83d4b8aa755076804cf502013c1bbace98bc821e5a8ba782e18f8fa11b088b70db05e454dd159d018ed06d197dd6014565077d4ebfb8b7db6d35f609ed05ffbcf3380687357f1a593b6f2842e76ff1df4bd5ae29584f89e9d2e50ccbb2964e2e6d3487a509a21e1f6c0ab2dcd9f70777a5c1d58dbf37d5ad66d553898b5620b1e35eb2a96ec010bb87957b6193071706744e312fff95abe536818207e41f7af43e08cca42680fadb739d70aafbeafa7fae70e4526c97e9edcac5648e4c38e10efd34d9f09592c73542bf127a1e68cf8fc3e58e78142b5e5fbbee0175350ab1a8aeedc6c8072ccaa476da314b578854756bb2db47caff231a7f64c51d1d7b4ed1e7cde59355285ef2c2be4ca6f0f6d01dc2d9845505f3a97a57f240c0b0f18fb4936dbb6cf7b6dbf6ec28e61a91ae6e748d0adec1c02c7a39019853b7497e5c3fdd571058f3e648b9f14080442b7279b28de971b6c8b97f1cea66a08bf83bee0707cae6972648a7f3924d63fd69ed03a13aaeba0d9e3bb239544359153fa124e70f873f9d10c07a5a0b58e82536153849350203d848998d61cbaa4f67dc73c84dbcd45939a3f01839e0897a3271118e304694db3ab806e05d206bd3c42dc79be167c9c297559d9a85d5eb04369c534360045b1a80e28d1466705873e3d8bfa73c44d59473df58b8a0305e6a5ec7300183cc60115288e393ca5d160a0fc8eaec5a77c0ba0798eed1e18890e2403ee8d156514eb6f5dc075d4a1f7ce70ae6fab8c82c6ecbcf3e973bc6a461f2f739f9820d66e28f3e9834a7ac8ed81a352c9f7a0882b14b2044ededaf694eba063ad3192f4dbf6ba79288a47ccbf6546c4fbbaefc864694e7063e39cb12ec68dca7b20986c48ae94022cdcb888222ee7f05f55ddea71f0298223b3c4109c15dd7ec41e78aef8dd5ff55c89ce7900261d62b35d12b813b8a385863f3c9d1f4ed37d7cd5314226afdb2892ddaeb1eec542cc8c040fc64cd3ae4dcd7264d68d247acbb353e40a33d5682ce2a4a005a2975908cbd0526beb6048840f3499cfcebba06eaf0c51c8b760593098a3def21b3664e7d42253f8c990538d382bf0768cdc106fac3699bcb5b12279f81dc9ba6ed1e2f7820f6cf8a2b3e4c88a33d9f0a32f60673b5897cadbbe7dffb9cf7f6b5a5d62701eba230fb2daa966a63d91e86c02472bd8114e5ba5df8152067086c142e6cd88289a501fc3353c1d0f17a663b179c446220d970d50a9c9adbb0b990be52ad19cd36669df47ff6e1f6fec4b7b1693c802d736aebe985e0c3c59c753ed95d79a7564880c4e2ffe5c9e59e818d2810468c48a4e75f15f3f252f2d780dd30717fe572c5d55adf090223fb30216c3882e9be19cb627aab1fdad81f8f117a90c2e7874edf1c4dc8e2da674348855659434eaba5c5063a29c28f4d22ce5515464b53967ab33d82f0e5afa98322c31e789be5d7600c726bd467d3be3eb4e0df733b91eecd95a5d1648ef268c43906b187ab24bb83bc80fa2ba4ab21d99c0aadf87d15cec51bf2cd52412ec638b43c27551f039e58026e6e910c7f327afe2e363491cfed5caadc8ca674659004f24991fdf76faac054dff64fb2282fc92d3b9ae32222833f1ae905dfa1dada3116765ef2b04ae6124f44cc7f83bd8f159eaa5290cc9e691fa77bec9c35a625b1b24cde8c9363b37b6f77ce844ea77752891b4c837c7c9648f7a16da6aadaf8912ba392c9984d26977c4b99e5c94925f0c6b9a48f2701eeb477aa0a99adb7fd145cd01b3cee9ad3c835690cda9ee1302fdf301558bb1979e177f18876b3fbe7b01597260a33822a63cdc760edee9839d75e0de20acdc8ae98a008d7390e4bb095650149b1bae84d240bd6480fbb10c1930f3a61dbfc3cb17888e33fb12f2dec1523380699b28300bf8b377e4357d5385176a35edbbb6e81e17e42fb07964452b53a069704f597cab1c646a8e8b99c0411e18def7e1c26e7cab72369228dfeb0d306cd46cdd9299538c89697c1c681d577290c2b03c9d84cd1b5803ff9291a28f3efbc3112b53e5cea348d364a954ac78db91e610df86be53c20707401d70f7768cdf0566420c1dfb7216877784244b5a84abc61e577b11b5dfd194018dbaa4024b57e6b0dcba72f621f62938f7a717c9a899aaa78b595f01c48f94c0bbf68c7cfb16c59269f48611dc9d7077b6805edbe30f2c7988a18f5ef3928a769f011936af9cb4665f48ce17afa1bb3f614e76b40a7e0920b9942362c41589f2be923530a186693a429a8e2767ec30d02407d4fbb6a397f52ec48fdb3fc0d2863f301585a14941cfac093cf8e53e91762db548306961979d396e4645f5698aa36db22603d1893149ba2d7aaa44bb14e0eceafd84cddb3c5c3e2a8eeb02a96e9d9f08db989b450614b0767314e4024114c785c95272226f1c2e2a29a07c7c133abaf254fb9d64a1c597ca32c3a1b17bf262907d9a5a468d37986a300f9a1274718521d76cc1fa8ae122f5dc46ba1c998c3d66bbfdece070f37ac35c7d7de0bffc8369f222fe768273edb69115f94177e9ab237ba50eafdefd5a2369059be377db15661961961c3bc60e6b1af713bd20d70b315025a249d5a6d67e340582404b561ae11fcc711c21c80a56d0a6b964d333e0c1a53333a2ebf4ebda28a59680639c0fd282d64539143b2d416accb7b5cfa16fb2dd9b767f79fe9c26f2b70972b2225ae8beae908dfcb34bbe30870369ea766479db570787a6e11d7544f32888b637e3cbbc4fc85e34d7847e26779e8a8d940ae28de2f2d122c1dba8948af913b2ba890cb12cf2db92ae75aac53614d6faaed47b4373147c6c93880646ee35d85394d25d9dadf73ea35ada21cdbc89038e90e9a28949fd84bac77ea7b2f79ece1c3c2defe5faf9b001ac4750920fc6414569413fd2cdb4e49751fa9c1a531d0081856aa2a9f884040610f9782eeb2c135afc0f60c09e1d5c3a83311010ead8b7bebe91bf339b7d88fab261596465fbbb8942fd32aac8661bb3ad21696895365e258f2a6d4e9049f93545e971fc053317082a2c6ebe65e571b29cdcbca06e5f422c6ea288f98d282ad5c9475a3e9258b4a21360d19cb91c99aeb6476f21049c8d6c9918a9ba7ced60b1f97b9b9cacef6958da3fb8b762f35043539c145956487110ccd420783f3c4490cecb089179c99a89e07fc14d2a8e8a78cc1cbbf0caaf9f8a6850fa8f150c45b616c102a09b995ac9408fdfd26b79339ad175691cc065f7911d99c53b249f03a96b3df1cca6f9dfd2d3c1e732681d58cc2fc671010e7bd98c006ba63b703266aa2f1c3d6fbc148902e425d83d044f014b9e7b3977b8fda094e02dd6dd8298983d5d891d66db077233fc155dad208bfe7c6585bdc6d246bba81cacff55994ee88f9163b27f51d6ae47d0b296124d3018f69f79528797e8aaf21d8035c044821137b0f7e7b3b41b8019379002ae9bc70dc1bc377b6fc0e2a40accf480ae0dc53e61a91d1815ea796fc14d6abddcee1fd965adc3a441333d430568bcb29f0cac078b70a4f6d1011c1822708fb1bbeeaea6433cf5cdcf9aec7bbce4c92e6fdda88b3dc48a4d42f4348a05fee23c41869ca326d39c0605d9144f82bd0c3c2f9ac9ae0b1f5fabe0ab5af39babf027a83df5b1c58513d27cb5babc9a5be073043543bff731da9bb715e57678507baf194fec9efa3235631b9594682dd531c3762432e25c25c048e600cc7c318e82b720db17436fbc054c04f59923ae61ec0b4896d08daab3b617bd8d239c24e95c8fcd1a7dd64a8a3d7e158c626833a2735c9e96514639f007983da3bb43a6f18e40d3eda0cc9468d118d28c6bda3ebae6c3ae2c14b1b02305abd16b7c6be707ffaf59142988eb931275bd4c38aefefbbaa95e16d7551f5f1fcfa9744a357d21c76b28747e5e94683d455530433876d509793ed409847f8a972450285f9e9f2dc665e78c7747418523bb51ef8191231e989ca93ef75e9ca27f38a2e5327d29c265c39f12fb1d01a723a902292c6bc06fdc6856d4829680909db55c4650449d0a2d2dad92cfbc8c03fdcb5656a56fded95b0ac41595a2a5bb34d5feb4e06da8adb5143eef67cdc3d18edd095c086d99cb43cddbbfeeb0beadadc1e30ec57bf760592e6365ffacbd6134b7262966af9c808f980fff81280566c79d3a2a15654c597aa050dda7ace4b5298f512b445023d4d86bc37c85ee1a2d7637f3ea0eafd6440893f43a2a912735d0dc8e2827148893f7554897fcb91a4f5581d793fa707fa181dcf69e3fddf498a19767922f4c52fd6797bfba85a61f9c5fe10970b06c7006d7b804f5d1db40b6f606f532cc5a6b93be6473bcbad8f06ead3995cb5f42ee8ddc658ac9085d0c6046b07be03837d5d68504c04b2a769db69e04aa1e414eec40118856f58ac5d3765e5d5038b20d2966389d0b462dfd71065140bf8ae0bb6eb105ac8160c8cc7641b14aaf0304731ab4d9d4bef89d62dd137d7f88645f941999e2fbfbd171a445c2702a87adcb5fd7d7e36d53b715e6ee87fcebdd0b9fef00182fa8e7ec8e7b5a3ac9d332ce92334a8e1ce0d493cff3c2a4fe1f902da785deb68bf936eabfe59a2f698b2d8d0dbd11c25f413ad4b7c554ed5d9e69a1c44c0dd523b47fc66e474357bd6b1e49fc2e12e30e206347d479ce0c20ef4b12e5d63de14e4b7550772a1ef0b5327d755aef1766da85e429a7920e4652d772619ea3526b330778ad35966c12e45a85ce6a5e3e99372a8c621e17ac2c3ff024c625a5599d41ad794e99ceeecb0bf334fd56b823e5b9406c6089fa406aaabe75afd7413affdc1019729d6f72a4b1a330412c03d9f75dbedb88bf556ee57a642fd1802e35807878f7aa15af0a00bc8fa8a4d01ff3e60249d07e780244d387cc60d7f25869f50580f0136391faec535332727b7ec85b12e3be7d8f34369f00b888133c3ad0ffa24bd03c5183d55172076b989b4151227467b915ab6e8347e15c99f2f9051d6ae0b2b72a717536899473b7c04160cc8d6d23a3f0ee63ae0ae4f79523af48779d836f0e0ae4b92ee78b820a9f6319ab064d11b7fb3e91579528a91c7c2521332ffaceb00ebaded7ef22d0ff9986273759b08b9f75565fe5c194bbfe704eda0fc0662db8cc3002b05dc39792540278a2c12501680ef4b95b3eac0573e559c6cf0badbe364e3bcaa14661afe1320a32d4e9644fdcd44b9dce2fee476e8f840a91a66cd877d3e5bbb5b595e654580955f4ba8548b41220a355a805669de9f3bc50157e594f5b444b88a320d80522e51bce929200d71e10e4a85c3d12ee133dda3fcdf7a454773a0575f7d9bfcb8c8646ffbad451446daf3ea742c0fa6bbb2ca4db442e60492ac9e131037278fa5552c0ed00c84469cd11600d3365617f57af4178fc264500327c48ae67de27c62766f9d6848e57f2ce0eb75e1cf72bafb21541c0370f73fc77e0d8b0b11056362a3936e38271259377d40fbc257d8c72b3e583fc6b0e20420dbc99a7932cb305fa9e61bd0de0d9758d35fe0ee13d0eaa782a3059e10caa61df3903aa1061298aced4712d998181e7edd03a11041de4018fe56cae17e0dced027", 0xff8}], 0x1}, 0x50) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0\x00', r0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0xffffffffffffffff, r0, 0x0, 0x274, &(0x7f0000001700)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x1c7b, 0x7, 0x80, 0x2, 0x0, 0x4, 0x12000, 0x4, 0x2, 0x7b, 0xffffffffffff0064, 0xcce, 0x3, 0x7ff, 0x2, 0x4, 0x0, 0x8000, 0x2, 0x8001, 0x0, 0xfff, 0x80, 0x1000, 0x8, 0x7f729b81, 0x4, 0xd4, 0x2fe5, 0xfffffffffffffff8, 0x6, 0x0, 0x7, 0x1, 0xbbd7, 0x7, 0x0, 0x50, 0x0, @perf_bp={&(0x7f0000000380), 0x7}, 0x2010, 0x1, 0x97, 0x1, 0x7ff, 0x93c}, r4, 0x0, r0, 0x0) [ 1162.741227][T21904] hfs: unable to parse mount options [ 1162.753721][T21901] hfs: can't find a HFS filesystem on dev loop2 [ 1162.768896][T21908] hfs: unable to parse mount options 07:31:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(0x0, &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x7ff, 0x1, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x7, 0x300) socket$kcm(0x10, 0x400800000000000, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) bpf$OBJ_PIN_MAP(0x6, 0x0, 0xfffffffffffffedc) openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0) r2 = socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffeae) sendmsg(r2, &(0x7f0000000140)={&(0x7f0000000200)=@isdn={0x22, 0x1f, 0xffffffff, 0x400, 0x4}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000006c0)="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", 0xff8}], 0x1}, 0x50) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0\x00', r0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0xffffffffffffffff, r0, 0x0, 0x274, &(0x7f0000001700)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x1c7b, 0x7, 0x80, 0x2, 0x0, 0x4, 0x12000, 0x4, 0x2, 0x7b, 0xffffffffffff0064, 0xcce, 0x3, 0x7ff, 0x2, 0x4, 0x0, 0x8000, 0x2, 0x8001, 0x0, 0xfff, 0x80, 0x1000, 0x8, 0x7f729b81, 0x4, 0xd4, 0x2fe5, 0xfffffffffffffff8, 0x6, 0x0, 0x7, 0x1, 0xbbd7, 0x7, 0x0, 0x50, 0x0, @perf_bp={&(0x7f0000000380), 0x7}, 0x2010, 0x1, 0x97, 0x1, 0x7ff, 0x93c}, r4, 0x0, r0, 0x0) 07:31:16 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r0}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) 07:31:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) pipe2$9p(&(0x7f0000000040), 0x84000) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1162.977114][T21913] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1163.076189][T21922] hfs: unable to parse mount options 07:31:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(0x0, &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f00000004c0)) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid'}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) 07:31:16 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000000)={0x0, 0x0, 0x0}) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) r3 = dup2(r1, r0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="b4000000", @ANYRES16=r4, @ANYBLOB="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"], 0xb4}, 0x1, 0x0, 0x0, 0x4000}, 0x0) [ 1163.222411][T21988] hfs: can't find a HFS filesystem on dev loop2 07:31:16 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) sendfile(r2, r2, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)) 07:31:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) pipe2$9p(&(0x7f0000000040), 0x84000) 07:31:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x7ff, 0x1, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x7, 0x300) socket$kcm(0x10, 0x400800000000000, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) bpf$OBJ_PIN_MAP(0x6, 0x0, 0xfffffffffffffedc) openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0) r2 = socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffeae) sendmsg(r2, &(0x7f0000000140)={&(0x7f0000000200)=@isdn={0x22, 0x1f, 0xffffffff, 0x400, 0x4}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000006c0)="5ea03f6db511aee466448c41d0a37c5d52fbf6d123b2238bc0dc67ffb8a030dd7d9264060255082b5024d1bd6e117d7a20ca56078066e91049b134eb2db929be3f0ac2f70eacf24ae891471c290affb67848907db14e21832c3df1d097ecf14e120ecc990d234042832cc0352f4c22b3828a9ad20ee214973a95bd34110513eb0b903c83d4b8aa755076804cf502013c1bbace98bc821e5a8ba782e18f8fa11b088b70db05e454dd159d018ed06d197dd6014565077d4ebfb8b7db6d35f609ed05ffbcf3380687357f1a593b6f2842e76ff1df4bd5ae29584f89e9d2e50ccbb2964e2e6d3487a509a21e1f6c0ab2dcd9f70777a5c1d58dbf37d5ad66d553898b5620b1e35eb2a96ec010bb87957b6193071706744e312fff95abe536818207e41f7af43e08cca42680fadb739d70aafbeafa7fae70e4526c97e9edcac5648e4c38e10efd34d9f09592c73542bf127a1e68cf8fc3e58e78142b5e5fbbee0175350ab1a8aeedc6c8072ccaa476da314b578854756bb2db47caff231a7f64c51d1d7b4ed1e7cde59355285ef2c2be4ca6f0f6d01dc2d9845505f3a97a57f240c0b0f18fb4936dbb6cf7b6dbf6ec28e61a91ae6e748d0adec1c02c7a39019853b7497e5c3fdd571058f3e648b9f14080442b7279b28de971b6c8b97f1cea66a08bf83bee0707cae6972648a7f3924d63fd69ed03a13aaeba0d9e3bb239544359153fa124e70f873f9d10c07a5a0b58e82536153849350203d848998d61cbaa4f67dc73c84dbcd45939a3f01839e0897a3271118e304694db3ab806e05d206bd3c42dc79be167c9c297559d9a85d5eb04369c534360045b1a80e28d1466705873e3d8bfa73c44d59473df58b8a0305e6a5ec7300183cc60115288e393ca5d160a0fc8eaec5a77c0ba0798eed1e18890e2403ee8d156514eb6f5dc075d4a1f7ce70ae6fab8c82c6ecbcf3e973bc6a461f2f739f9820d66e28f3e9834a7ac8ed81a352c9f7a0882b14b2044ededaf694eba063ad3192f4dbf6ba79288a47ccbf6546c4fbbaefc864694e7063e39cb12ec68dca7b20986c48ae94022cdcb888222ee7f05f55ddea71f0298223b3c4109c15dd7ec41e78aef8dd5ff55c89ce7900261d62b35d12b813b8a385863f3c9d1f4ed37d7cd5314226afdb2892ddaeb1eec542cc8c040fc64cd3ae4dcd7264d68d247acbb353e40a33d5682ce2a4a005a2975908cbd0526beb6048840f3499cfcebba06eaf0c51c8b760593098a3def21b3664e7d42253f8c990538d382bf0768cdc106fac3699bcb5b12279f81dc9ba6ed1e2f7820f6cf8a2b3e4c88a33d9f0a32f60673b5897cadbbe7dffb9cf7f6b5a5d62701eba230fb2daa966a63d91e86c02472bd8114e5ba5df8152067086c142e6cd88289a501fc3353c1d0f17a663b179c446220d970d50a9c9adbb0b990be52ad19cd36669df47ff6e1f6fec4b7b1693c802d736aebe985e0c3c59c753ed95d79a7564880c4e2ffe5c9e59e818d2810468c48a4e75f15f3f252f2d780dd30717fe572c5d55adf090223fb30216c3882e9be19cb627aab1fdad81f8f117a90c2e7874edf1c4dc8e2da674348855659434eaba5c5063a29c28f4d22ce5515464b53967ab33d82f0e5afa98322c31e789be5d7600c726bd467d3be3eb4e0df733b91eecd95a5d1648ef268c43906b187ab24bb83bc80fa2ba4ab21d99c0aadf87d15cec51bf2cd52412ec638b43c27551f039e58026e6e910c7f327afe2e363491cfed5caadc8ca674659004f24991fdf76faac054dff64fb2282fc92d3b9ae32222833f1ae905dfa1dada3116765ef2b04ae6124f44cc7f83bd8f159eaa5290cc9e691fa77bec9c35a625b1b24cde8c9363b37b6f77ce844ea77752891b4c837c7c9648f7a16da6aadaf8912ba392c9984d26977c4b99e5c94925f0c6b9a48f2701eeb477aa0a99adb7fd145cd01b3cee9ad3c835690cda9ee1302fdf301558bb1979e177f18876b3fbe7b01597260a33822a63cdc760edee9839d75e0de20acdc8ae98a008d7390e4bb095650149b1bae84d240bd6480fbb10c1930f3a61dbfc3cb17888e33fb12f2dec1523380699b28300bf8b377e4357d5385176a35edbbb6e81e17e42fb07964452b53a069704f597cab1c646a8e8b99c0411e18def7e1c26e7cab72369228dfeb0d306cd46cdd9299538c89697c1c681d577290c2b03c9d84cd1b5803ff9291a28f3efbc3112b53e5cea348d364a954ac78db91e610df86be53c20707401d70f7768cdf0566420c1dfb7216877784244b5a84abc61e577b11b5dfd194018dbaa4024b57e6b0dcba72f621f62938f7a717c9a899aaa78b595f01c48f94c0bbf68c7cfb16c59269f48611dc9d7077b6805edbe30f2c7988a18f5ef3928a769f011936af9cb4665f48ce17afa1bb3f614e76b40a7e0920b9942362c41589f2be923530a186693a429a8e2767ec30d02407d4fbb6a397f52ec48fdb3fc0d2863f301585a14941cfac093cf8e53e91762db548306961979d396e4645f5698aa36db22603d1893149ba2d7aaa44bb14e0eceafd84cddb3c5c3e2a8eeb02a96e9d9f08db989b450614b0767314e4024114c785c95272226f1c2e2a29a07c7c133abaf254fb9d64a1c597ca32c3a1b17bf262907d9a5a468d37986a300f9a1274718521d76cc1fa8ae122f5dc46ba1c998c3d66bbfdece070f37ac35c7d7de0bffc8369f222fe768273edb69115f94177e9ab237ba50eafdefd5a2369059be377db15661961961c3bc60e6b1af713bd20d70b315025a249d5a6d67e340582404b561ae11fcc711c21c80a56d0a6b964d333e0c1a53333a2ebf4ebda28a59680639c0fd282d64539143b2d416accb7b5cfa16fb2dd9b767f79fe9c26f2b70972b2225ae8beae908dfcb34bbe30870369ea766479db570787a6e11d7544f32888b637e3cbbc4fc85e34d7847e26779e8a8d940ae28de2f2d122c1dba8948af913b2ba890cb12cf2db92ae75aac53614d6faaed47b4373147c6c93880646ee35d85394d25d9dadf73ea35ada21cdbc89038e90e9a28949fd84bac77ea7b2f79ece1c3c2defe5faf9b001ac4750920fc6414569413fd2cdb4e49751fa9c1a531d0081856aa2a9f884040610f9782eeb2c135afc0f60c09e1d5c3a83311010ead8b7bebe91bf339b7d88fab261596465fbbb8942fd32aac8661bb3ad21696895365e258f2a6d4e9049f93545e971fc053317082a2c6ebe65e571b29cdcbca06e5f422c6ea288f98d282ad5c9475a3e9258b4a21360d19cb91c99aeb6476f21049c8d6c9918a9ba7ced60b1f97b9b9cacef6958da3fb8b762f35043539c145956487110ccd420783f3c4490cecb089179c99a89e07fc14d2a8e8a78cc1cbbf0caaf9f8a6850fa8f150c45b616c102a09b995ac9408fdfd26b79339ad175691cc065f7911d99c53b249f03a96b3df1cca6f9dfd2d3c1e732681d58cc2fc671010e7bd98c006ba63b703266aa2f1c3d6fbc148902e425d83d044f014b9e7b3977b8fda094e02dd6dd8298983d5d891d66db077233fc155dad208bfe7c6585bdc6d246bba81cacff55994ee88f9163b27f51d6ae47d0b296124d3018f69f79528797e8aaf21d8035c044821137b0f7e7b3b41b8019379002ae9bc70dc1bc377b6fc0e2a40accf480ae0dc53e61a91d1815ea796fc14d6abddcee1fd965adc3a441333d430568bcb29f0cac078b70a4f6d1011c1822708fb1bbeeaea6433cf5cdcf9aec7bbce4c92e6fdda88b3dc48a4d42f4348a05fee23c41869ca326d39c0605d9144f82bd0c3c2f9ac9ae0b1f5fabe0ab5af39babf027a83df5b1c58513d27cb5babc9a5be073043543bff731da9bb715e57678507baf194fec9efa3235631b9594682dd531c3762432e25c25c048e600cc7c318e82b720db17436fbc054c04f59923ae61ec0b4896d08daab3b617bd8d239c24e95c8fcd1a7dd64a8a3d7e158c626833a2735c9e96514639f007983da3bb43a6f18e40d3eda0cc9468d118d28c6bda3ebae6c3ae2c14b1b02305abd16b7c6be707ffaf59142988eb931275bd4c38aefefbbaa95e16d7551f5f1fcfa9744a357d21c76b28747e5e94683d455530433876d509793ed409847f8a972450285f9e9f2dc665e78c7747418523bb51ef8191231e989ca93ef75e9ca27f38a2e5327d29c265c39f12fb1d01a723a902292c6bc06fdc6856d4829680909db55c4650449d0a2d2dad92cfbc8c03fdcb5656a56fded95b0ac41595a2a5bb34d5feb4e06da8adb5143eef67cdc3d18edd095c086d99cb43cddbbfeeb0beadadc1e30ec57bf760592e6365ffacbd6134b7262966af9c808f980fff81280566c79d3a2a15654c597aa050dda7ace4b5298f512b445023d4d86bc37c85ee1a2d7637f3ea0eafd6440893f43a2a912735d0dc8e2827148893f7554897fcb91a4f5581d793fa707fa181dcf69e3fddf498a19767922f4c52fd6797bfba85a61f9c5fe10970b06c7006d7b804f5d1db40b6f606f532cc5a6b93be6473bcbad8f06ead3995cb5f42ee8ddc658ac9085d0c6046b07be03837d5d68504c04b2a769db69e04aa1e414eec40118856f58ac5d3765e5d5038b20d2966389d0b462dfd71065140bf8ae0bb6eb105ac8160c8cc7641b14aaf0304731ab4d9d4bef89d62dd137d7f88645f941999e2fbfbd171a445c2702a87adcb5fd7d7e36d53b715e6ee87fcebdd0b9fef00182fa8e7ec8e7b5a3ac9d332ce92334a8e1ce0d493cff3c2a4fe1f902da785deb68bf936eabfe59a2f698b2d8d0dbd11c25f413ad4b7c554ed5d9e69a1c44c0dd523b47fc66e474357bd6b1e49fc2e12e30e206347d479ce0c20ef4b12e5d63de14e4b7550772a1ef0b5327d755aef1766da85e429a7920e4652d772619ea3526b330778ad35966c12e45a85ce6a5e3e99372a8c621e17ac2c3ff024c625a5599d41ad794e99ceeecb0bf334fd56b823e5b9406c6089fa406aaabe75afd7413affdc1019729d6f72a4b1a330412c03d9f75dbedb88bf556ee57a642fd1802e35807878f7aa15af0a00bc8fa8a4d01ff3e60249d07e780244d387cc60d7f25869f50580f0136391faec535332727b7ec85b12e3be7d8f34369f00b888133c3ad0ffa24bd03c5183d55172076b989b4151227467b915ab6e8347e15c99f2f9051d6ae0b2b72a717536899473b7c04160cc8d6d23a3f0ee63ae0ae4f79523af48779d836f0e0ae4b92ee78b820a9f6319ab064d11b7fb3e91579528a91c7c2521332ffaceb00ebaded7ef22d0ff9986273759b08b9f75565fe5c194bbfe704eda0fc0662db8cc3002b05dc39792540278a2c12501680ef4b95b3eac0573e559c6cf0badbe364e3bcaa14661afe1320a32d4e9644fdcd44b9dce2fee476e8f840a91a66cd877d3e5bbb5b595e654580955f4ba8548b41220a355a805669de9f3bc50157e594f5b444b88a320d80522e51bce929200d71e10e4a85c3d12ee133dda3fcdf7a454773a0575f7d9bfcb8c8646ffbad451446daf3ea742c0fa6bbb2ca4db442e60492ac9e131037278fa5552c0ed00c84469cd11600d3365617f57af4178fc264500327c48ae67de27c62766f9d6848e57f2ce0eb75e1cf72bafb21541c0370f73fc77e0d8b0b11056362a3936e38271259377d40fbc257d8c72b3e583fc6b0e20420dbc99a7932cb305fa9e61bd0de0d9758d35fe0ee13d0eaa782a3059e10caa61df3903aa1061298aced4712d998181e7edd03a11041de4018fe56cae17e0dced027", 0xff8}], 0x1}, 0x50) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0\x00', r0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0xffffffffffffffff, r0, 0x0, 0x274, &(0x7f0000001700)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x1c7b, 0x7, 0x80, 0x2, 0x0, 0x4, 0x12000, 0x4, 0x2, 0x7b, 0xffffffffffff0064, 0xcce, 0x3, 0x7ff, 0x2, 0x4, 0x0, 0x8000, 0x2, 0x8001, 0x0, 0xfff, 0x80, 0x1000, 0x8, 0x7f729b81, 0x4, 0xd4, 0x2fe5, 0xfffffffffffffff8, 0x6, 0x0, 0x7, 0x1, 0xbbd7, 0x7, 0x0, 0x50, 0x0, @perf_bp={&(0x7f0000000380), 0x7}, 0x2010, 0x1, 0x97, 0x1, 0x7ff, 0x93c}, r4, 0x0, r0, 0x0) [ 1163.356310][T22031] hfs: unable to parse mount options 07:31:16 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000080)="6c77e3c531ddf1665c69f956f54d29a87b94b1e9099ad8bfe05334d0b462df699946ba0a13e2a9bc09e036fc08fa5775b0a9aa21e9dccc069744080e3c27c7a3748d1c5d679b800f70bef9c84daf9981d0f80c0571e3609b0ebe87106cfac868354b4eafb50da92a161ad48612fd993392c1a934e7f4d0a054b3d4879407a02867362dd23b4d46760ba4f6622aad351858e22babd59a2512ff78237e536f932122595816830b6df8555a7d5f06542e212416e876edfa3478723f91b4d2b0fa3385eabc52f6801d545fed11d2d744672e214099cafd6bb6a54f46c813076f1b7435c945cf8dc662ca9233203eb2", 0xed}, {&(0x7f0000000180)="a1c09ec66c61a501c405cfbc829bea38d1de91e06fbcb45da2844d77966e925ee2fc9e69fd14ceb3d4363412bb811a501d3527ccb63a3034df908d907339ccc9dbf37a8346362c1d48130bb37e43e636ff3c144d2290096568c60395e9", 0x5d}, {&(0x7f0000000200)="32b17ca3553ca66a2a471cb55b3f72720d2abe2dba69c954945e83805a9a94d6ccce17728efadbfe32b544346e4bed89316d26703e5dd1e78b3ffd17d19adcbf234ed49903f04df925dcfd307e8950b4a4f932f1f3c83d9bfd1a2a89e0ae54f18d6c4776a2c8de221ff739829d722c1cb88cf738de5cebf61e39d3f1a3b54836754c629a5ca4dafc2aaf3a13b908073a4a1fc54aaa4283f0b3cf6dbad22fa004580d7c98146d3b42a7de0273d46aefedc9d62bb03389082de115ab35cffb7e6acf2b4859ebcacd3c28a67415c8eab1854e966d7b6e182a403e202bed4d14cb19540e08fe1f4a6936aaa86b2babd062e3879004f0349f62269ce9ec94a8f9", 0xfe}, {&(0x7f0000000300)}, {&(0x7f0000000340)="d5d9e10603416a32045382d0761576ae8047a302d3249d110285e8ee07be14c8c89329a9a8c82f37e33a042d1c86d92a5438b6e5df68b14c2ec6c09e32db8f104d0a64692c944d3a3e983e504c3fab3c3583ffbeb71fa54bdf180a20adb1ffa3d554644c59842a9783a817893ddc1bfd844bf3f53cf47e4c7f37a6bfdd62c1df2daefd40aaf3c067f844ddb06da31f9de8a21be5a1201265c1ee205f1c76ca9be5cf558369d74ec0296551c35eb023ffa48166909c243e08c7028c1303b24d19ab67027a6d72ca7ee5ca2f0454", 0xcd}, {&(0x7f0000000440)="d9091f2d2939794c5a3019d2c6e7606ae725bd79870633335d698900e29add95c48114fb6acae61dca772e03a426567152daa1272c6ba66e2f9232fb130e", 0x3e}], 0x6) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000300)=0x7) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000000)={0x0, 0x0, 0x0}) 07:31:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(0x0, &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f00000004c0)) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid'}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) 07:31:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) 07:31:16 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000080)="6c77e3c531ddf1665c69f956f54d29a87b94b1e9099ad8bfe05334d0b462df699946ba0a13e2a9bc09e036fc08fa5775b0a9aa21e9dccc069744080e3c27c7a3748d1c5d679b800f70bef9c84daf9981d0f80c0571e3609b0ebe87106cfac868354b4eafb50da92a161ad48612fd993392c1a934e7f4d0a054b3d4879407a02867362dd23b4d46760ba4f6622aad351858e22babd59a2512ff78237e536f932122595816830b6df8555a7d5f06542e212416e876edfa3478723f91b4d2b0fa3385eabc52f6801d545fed11d2d744672e214099cafd6bb6a54f46c813076f1b7435c945cf8dc662ca9233203eb2", 0xed}, {&(0x7f0000000180)="a1c09ec66c61a501c405cfbc829bea38d1de91e06fbcb45da2844d77966e925ee2fc9e69fd14ceb3d4363412bb811a501d3527ccb63a3034df908d907339ccc9dbf37a8346362c1d48130bb37e43e636ff3c144d2290096568c60395e9", 0x5d}, {&(0x7f0000000200)="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", 0xfe}, {&(0x7f0000000300)}, {&(0x7f0000000340)="d5d9e10603416a32045382d0761576ae8047a302d3249d110285e8ee07be14c8c89329a9a8c82f37e33a042d1c86d92a5438b6e5df68b14c2ec6c09e32db8f104d0a64692c944d3a3e983e504c3fab3c3583ffbeb71fa54bdf180a20adb1ffa3d554644c59842a9783a817893ddc1bfd844bf3f53cf47e4c7f37a6bfdd62c1df2daefd40aaf3c067f844ddb06da31f9de8a21be5a1201265c1ee205f1c76ca9be5cf558369d74ec0296551c35eb023ffa48166909c243e08c7028c1303b24d19ab67027a6d72ca7ee5ca2f0454", 0xcd}, {&(0x7f0000000440)="d9091f2d2939794c5a3019d2c6e7606ae725bd79870633335d698900e29add95c48114fb6acae61dca772e03a426567152daa1272c6ba66e2f9232fb130e", 0x3e}], 0x6) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000300)=0x7) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000000)={0x0, 0x0, 0x0}) 07:31:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1163.684642][T22118] hfs: unable to parse mount options 07:31:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) 07:31:16 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000080)="6c77e3c531ddf1665c69f956f54d29a87b94b1e9099ad8bfe05334d0b462df699946ba0a13e2a9bc09e036fc08fa5775b0a9aa21e9dccc069744080e3c27c7a3748d1c5d679b800f70bef9c84daf9981d0f80c0571e3609b0ebe87106cfac868354b4eafb50da92a161ad48612fd993392c1a934e7f4d0a054b3d4879407a02867362dd23b4d46760ba4f6622aad351858e22babd59a2512ff78237e536f932122595816830b6df8555a7d5f06542e212416e876edfa3478723f91b4d2b0fa3385eabc52f6801d545fed11d2d744672e214099cafd6bb6a54f46c813076f1b7435c945cf8dc662ca9233203eb2", 0xed}, {&(0x7f0000000180)="a1c09ec66c61a501c405cfbc829bea38d1de91e06fbcb45da2844d77966e925ee2fc9e69fd14ceb3d4363412bb811a501d3527ccb63a3034df908d907339ccc9dbf37a8346362c1d48130bb37e43e636ff3c144d2290096568c60395e9", 0x5d}, {&(0x7f0000000200)="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", 0xfe}, {&(0x7f0000000300)}, {&(0x7f0000000340)="d5d9e10603416a32045382d0761576ae8047a302d3249d110285e8ee07be14c8c89329a9a8c82f37e33a042d1c86d92a5438b6e5df68b14c2ec6c09e32db8f104d0a64692c944d3a3e983e504c3fab3c3583ffbeb71fa54bdf180a20adb1ffa3d554644c59842a9783a817893ddc1bfd844bf3f53cf47e4c7f37a6bfdd62c1df2daefd40aaf3c067f844ddb06da31f9de8a21be5a1201265c1ee205f1c76ca9be5cf558369d74ec0296551c35eb023ffa48166909c243e08c7028c1303b24d19ab67027a6d72ca7ee5ca2f0454", 0xcd}, {&(0x7f0000000440)="d9091f2d2939794c5a3019d2c6e7606ae725bd79870633335d698900e29add95c48114fb6acae61dca772e03a426567152daa1272c6ba66e2f9232fb130e", 0x3e}], 0x6) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000300)=0x7) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000000)={0x0, 0x0, 0x0}) 07:31:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f00000004c0)) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid'}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) [ 1163.976924][T22168] hfs: unable to parse mount options 07:31:17 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)) 07:31:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) 07:31:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) 07:31:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:17 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000080)="6c77e3c531ddf1665c69f956f54d29a87b94b1e9099ad8bfe05334d0b462df699946ba0a13e2a9bc09e036fc08fa5775b0a9aa21e9dccc069744080e3c27c7a3748d1c5d679b800f70bef9c84daf9981d0f80c0571e3609b0ebe87106cfac868354b4eafb50da92a161ad48612fd993392c1a934e7f4d0a054b3d4879407a02867362dd23b4d46760ba4f6622aad351858e22babd59a2512ff78237e536f932122595816830b6df8555a7d5f06542e212416e876edfa3478723f91b4d2b0fa3385eabc52f6801d545fed11d2d744672e214099cafd6bb6a54f46c813076f1b7435c945cf8dc662ca9233203eb2", 0xed}, {&(0x7f0000000180)="a1c09ec66c61a501c405cfbc829bea38d1de91e06fbcb45da2844d77966e925ee2fc9e69fd14ceb3d4363412bb811a501d3527ccb63a3034df908d907339ccc9dbf37a8346362c1d48130bb37e43e636ff3c144d2290096568c60395e9", 0x5d}, {&(0x7f0000000200)="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", 0xfe}, {&(0x7f0000000300)}, {&(0x7f0000000340)="d5d9e10603416a32045382d0761576ae8047a302d3249d110285e8ee07be14c8c89329a9a8c82f37e33a042d1c86d92a5438b6e5df68b14c2ec6c09e32db8f104d0a64692c944d3a3e983e504c3fab3c3583ffbeb71fa54bdf180a20adb1ffa3d554644c59842a9783a817893ddc1bfd844bf3f53cf47e4c7f37a6bfdd62c1df2daefd40aaf3c067f844ddb06da31f9de8a21be5a1201265c1ee205f1c76ca9be5cf558369d74ec0296551c35eb023ffa48166909c243e08c7028c1303b24d19ab67027a6d72ca7ee5ca2f0454", 0xcd}, {&(0x7f0000000440)="d9091f2d2939794c5a3019d2c6e7606ae725bd79870633335d698900e29add95c48114fb6acae61dca772e03a426567152daa1272c6ba66e2f9232fb130e", 0x3e}], 0x6) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000300)=0x7) 07:31:17 executing program 4: r0 = syz_open_dev$video(&(0x7f0000001480)='/dev/video#\x00', 0x3, 0x0) ustat(0x6372, &(0x7f0000000080)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001540)='/dev/sequencer\x00', 0x400, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001580)={0x0, @empty, @loopback}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001600)={r2, @local, @loopback}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001280)='cpuacct.stat\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f00000012c0)=0x9, 0x4) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000000)={0x0, 0x0, 0x0}) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/hwrng\x00', 0x10002, 0x0) connect$netrom(r4, &(0x7f0000001200)={{0x3, @default, 0x4}, [@default, @bcast, @null, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) ioctl$SIOCAX25ADDFWD(r4, 0x89ea, &(0x7f0000001140)={@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) io_uring_register$IORING_UNREGISTER_EVENTFD(r5, 0x5, 0x0, 0x0) write$vhci(r5, &(0x7f0000001300)=ANY=[@ANYBLOB="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"], 0x44) mq_timedsend(r5, &(0x7f0000000100)="66238708c024f7e1ddf80bfb640ea8d87b404e86e70357e5079fb3bd02c1a522f0dc7fee69bad78a4d465430fb31294d60640e5aeed80220f7df53db8b26d51334c5bfbdf7821de3839b956fe3835fb4f944bf8ed6731d0e1c0413e64a64d5da8d73997b760ca84de16cf6d7e2fae5b5006bc27189d554c04a4a8abdf0bbaa9fea8488c7551b8b658f2d2fd0bf8778b035e5216b4050226a33c34a79b2845b6e1b0162262f6ed48603a8c5c49b73815aaa5ede95215cc987d4719c3b5367ec5d8a0e98e2500d42cc18381d1010a1aaa604a9e368d1fddf45c120733451d8ca5de2fdd01cd52353106ba7525c7fa6f81859ac3a09d99035e353d5c428a1784aad3aba0a0bf8208dfa5107f4e60f23b05edccb6c9d8155046a5a0fcdcd8bab6409f8483841b3d2a35f428b44c9bc11ae5b0ae77451f3cd0fd7c388e0595c5b91be8cc892fa7e0a077306b6cacf8ec8706cb9945063f4f45c069f86ca50d0c58db4cd3d079f269c80c8761d7f670ad83293dea940bbbae31f978e0d6d180cf50d2c4bd2b01a9a1df371a1e81e5efc320e095601b9ab114baa3441b3a9785483266355818c17ecd7b72af4c9a904d0f43595f47eb8975583e8d892e4d75522a728060fd5be60c59c5efc10e1b26b326de859d24b2e0c3c27bff72707467fc4064c4021b7fe3d67bab2768ff4e2deb36c578fc825f3aab63fcac4c4e381e663163cf7caae2149a9d582925cc7f622832c17f7e794eb7209e9714913cbd9852a3d45e2efd54f8b29cda8553e6c3e5541bcf47bcf040e4266979ff0a6f66ca05657a5e292e6c623e6261a04137da733f1219b40d1830c4d52803a66a74eab3868fd5dd78f409d1088ebd63affaa822e5f799e08f51cc4eea37d8188672adb8128affa236f5e98a976916e6cdde23e694935426d90592d9ff39d3deb50f5c3aa84d14543cf16beb12e2e2e2ed0d7238dfcb43820a7150f628a09e5d32e07aff468a5cfc2088efa2fa4fdd1c94489bcb950075d2871d24648361a5ca8469a9fa227dc0cd3dd5a138428c78c4e2556d705063cb7812642233f8e8a25e53ada6e95630eda73912b4b22198ac6ce6c8aa81c59e471e756a94342a6725d5603f90349896f89a2067f763c804bb58a8230dbe926d4e4498bd23e218908126975b1a0902e0b1ad7799f20e366baa70b98f952eb474e70fe8ecdefa0b31b096ddad7a648ac3ccfd6fbdb8e056edf7a8c6e9c34ba5b195b3aa2fcde1e668d553149cc780ddac38296512e5d78c046dcc314abf49792d70b050ae4af8b77866931f4bd3c9ac5dbf4ce362354abaafa1143a11bc55172f53dfed71f7ab2a68b35cdb59a27f3528969055eaeb435fe0ad15bf1ae6fb9cc9b39ad6c484ab513c3955fd6b1a1c8ae5d34a8fb21ece1652a8bfe9065f99bd535e663d4970524cfd3fcce01cecf2c882da00c03b25a0f1645b519afe3df3e8998a3cef24ac2a0a5016259b243dfcbc482ea80bc150909df046f6d38b56435b671c85cee348cb3633f43dd91c8b09ff0721406018a10a6db3b7fa25d579054fc869be3fd6c4ad623317e6cee19dfb50283463badaf17987635ad6535d0f92975c434b66ae74d98eee0298d5848215ff8a1fc4b0ff18707eb0ee2949d8821b9cacf3f519a5f71c40f5f3783ba804c4aef38b99eebd10895b2918a7caf9cf12dbc601bc5524271a62ce461b8924c532d4fd0cccd3f7530029e7cc5357837c9876df0925f21229c58b380933986cc2f9868c7bea90b04f1c047812f7242141bebfdf1cbc50228c1df7ea315dbf3540f7d6d1a78b57992483453fd02cca5245bcbe1c04e47221315e419fc19e4215ed848e4585bab5cec7a669d76caa7e26efd2fd322aa5b53025d3f233cadb508d8588b12c345a6b601b9b47bef8d683369cdb7dca7f43b4824ca9e300121b97ccbedf362d7f92d0e488e6361e9ffebf69736399a736b9ce4f0f2bd0bd38cb15f38198298ff663a35e023cee4a46bacbe33324733dceb881d4d131110fe7858463e1950c5e4a7b8f1bb43d77eb66bcf7c0c6c93985f36486bdb72bcb1bbff645455e59e6a8b3617a1e147df86a671cf54c607ae47ab0a6ec91d93978ff4ad0f01f045a44bef87e38d7f9a5c9e8f44a7e47a64c26f73ccc98ebb906947b0b324307eafe0c6f2c001e856d46bda90e7b7f7b8a68273ab1950d5f345eebf89cbb866cc18ad554ac6acf6d74914efeb570b929117a4e31e05c8f4a6a18e2a32d5a1598437ab8d07caa67d40e3c369af3a3d1b01742dc1f826193dbc26888877be8f36039656e47db4f7eda234e1e4e61ad09d5c0a768c06a5eb77d1e93365c443b22fd562fbbb84f427b2eef9d2c27a41c566c46dd0f4615b546fc194860e2881fd746ed322ba48e2ed122ef3ee4c8fa1d6b0d79216d660c7a4243b926609fd225ae85cc26e17df9be3f88374e8f25e2134354d7e5a629e41a1feee7a36c0b034c9187626ff5043f61a6051257fa672884b9723aa0f738a412243fe44aabcd613fe2731c453fa2811b79b965043fad12d63c022ac6b41e2b7134359fd00503b4879034ae6f552407959c505f6e46b84be44ef3053859ee7a9e8cf932ffc948224ddd8c229806ba2c711cde667e81059a517b67470349d58cccdce3f1f62667e8b2e912a7fe14839aea0ac86f079868a4363b492ce771733c4d70b02874dddfeca3c2f75a4eecee7b102d8f13887a9306c25202c05351d66e0472a0f2d1d0e6f30499dbf5080943a08125628760f769b90b5664226b0caaf832b11ddcc24ef6d491ea29dcbf5edcf8ed6ecb29ef45008e919f11e955de2827c80d4ea417fbb7e0f806c4ed0175ac9d9778222bd5eda2b5cf2fd4abe59dc3bcc14687362357e1ecacf89b0736ff41b4233dd86d6c26027a5900b94c45db331707d930d5201fefa3682b8a6c116f778f958f48b3984a7c10b9d400bf92ea15dae4376589d85d81993bf3535d59f7525cb37676af0ce8cd92909583c8598f4386b55cd5e4fae99c37dd696655436265e59b524a2aafaf24d3582e738adf28d628a8393f275b0035242aa30cc3f23c1dedfbbae5416763834095dcd471a870dd4b0a6a97a8062ba7fd1c5aa57d8933ce70c5d870dd397cc49ad4b4a11ed1178ba5346cf7cb1fe86342bc7b8fc990b2d7fa671ce46beb10b0a3ee67aac1357fb93bb05a7d5e604b993ba19ef531951e1d7aa2e6ecebc03fafc447644da1fc578b51d483916a8cb865b28d161d16d78a1bf28de425c62afc51ff47aa61cc749d0bcbf676e70ece0c083818eecce03dc3c4e15680107f54460202e6bcf370124b53919f8476ec2f934db8b2313660a497298770f949bd843f861652be3df454829b7480e36ab14aca49fd7513a1c8f80c106f006eb1ea14a80c7273ef942d19619de719d0e21a3fb363bc639cccd2dff3207bb4f8989d6e134c19632db8452de0b6bc6ae4edd50abf85d12e21ff6c7862ad4e67d8c116390bb5f9787391a8c76eb09b5da9da7703a1557773f76c9f3364a265a00ccc0f63888c998e0598674b03ef256b27456949bafd5466d5c1e9be13fad9593f7e05d903425b9db46f48837b7c21fd43e9bebcb722b46e236945ab3ff81c87371b0251f6717118f138781372725eb3abb0f81521c0e3d96177111b4195e93ac190d643de8a99d72ac822be55eb8cee9534287b1c370a09abaa04e5bed8eb19b1a04cd9c2490cd886ed1bfe7853eace083f7d15661c230efdc564e3a646bea26950c6e75d44a2fe3e5ff7a43b1328483143e1fa044b749dfe4bb59c90e1237652947a54abc41d80644c6fccf5de14a31a8260faefac881cb67b023c703d6a32e183eacdc8421676a1ea48fbcbe9629b3dbdbbffc5439362dec8e50b3d445bed97d47a262874bd95e7724bb8198d5aaeef24270f98acb74c8ad99aa358f1dad04068bcccdd0b93314b476a5a8b6ef533f0d7742170f05ea63331e88c51fc320a7e21132b814207790f323a6d36e53c797f022aeab5493dec98cac92afb6ce96ba807ac08c5d5bf5b7432ac90c47d4643a8200111dd0a3c28cc6c6d30dbd09e73cb8104582ae07e7e575da65c7110bd7eab1c3d053f84d612f59db4a61a7ad1def3ce6a69675563dd70ba3a01ff623d2589681ec2ff856d81cb1e8dbb791c79a858a098280c072231917e6df0f02270a7ed4eb41d9254865eb6d4f0f6f67d5f1dfcd8069070f5ff464aaadf94c7f4ce5d9da2cea517c5c72a187ae2451c3af9c15d17c2640c47b783070be24699245e2cdfa2042d89d4e85a62ca523ee8853243378c823a5ba20fd4f4cff77b5a155ccfbe25736c42ae39b520b7cfdd07d9c6cdf507108fe77a78d247dc09573ced49ebd4f534b48108c5fee59e759f1fac8539457e65a3775ed733850005dd0a10c800b1014157062a4c951d5df0c08b9dd685c1bdf904542897f09814efe8bcfdcde25d8a4dcb8adf4e91d7acf8d6448d97e489ad7e3376b09dc75b7db12718692e7d9febd38c3a5b2ed54491d57ba7e8acfec66fabfd5d896c9859fddcd3a6f60b1eec712bb46f1610ddeb96641cd9db4c32583a187656af3d1d3bd2c3794ad13b574d69fd6caca404ed0bbf9e75db869727ae649a2bf9bac4057a001f1d6834732b053f11c6af70e5b5debca87337cc9ab0b15a06aff1a7655ca6c297481cfd285cd5987771e6d3cec65ff6fc77b8c4484e43a8e34bbe6914dbaf79b38bc66a75047bb106e5c37add57ab2ce7369b88dad1c04f1b5d394eaebd6121469f1c6a4b746d6c8dfe502e9b520d2fa36edee4f118796dce1e52a95b87dc87b87c3f70c1c76d45df6a04b2cedb22709131d4fef83c0360b5cf0d82484dd4120a2fbb710716f6a498238ca4ad369214a8ac9401d4c6853bf49951e9a69307f12299f8ee2c551ed781890799b228f4c73ea8b43569d69fe0d94694ed84682b81f2e52d8749e74e854f580b2cb222aaf078dde42ca03f25a7c364c2107175a745c19de808bc208fcd3789b1573c9f1407cb8839e1ecdbdbad672dcdd1a277243cbd98a5a874880f7567a90477f62c21a7c98dc56c0b1534ec28f867e62a19712f8bc46c7721e5f1125dfb0185933d5681cecfc6b03bc22c4e15032d7afde4538d73806af9b5ba83c47c953221a90177c3602f145ebd72f0ff96d9a060039011f49b0d742ba4af3dfcda10cc8c6e8c4fac54b056063ec6de7dc5b6d47d8516a73bd7ce2f1edacd21382536c7d3812ddc59a119cc40ba4c955c581f8253d8223697f1a2cd6c1285c7d692fac39e7eb3f0f8c1ae37cf73ee0317ebd5b19f9a4a3de4afeb967217c750ddac6415e38f5c0524584772c57bc394bcb8b608a8f40da06c27914702aa401af9340dbfe0e5c6077cb16976850782803bca95131def968ce0eb628e34f0c94cf751d633eebf8e1d88498763e1daccc217ebce48318531fef511045ef0c3588f2248d5ac7cd325d90f95574af3aed04a8b3e47b5d58b1d4d65af36f439db41013e14c4840330dc90fbf0bb4cf5aa77049a746e4ca77e4fd40f0b7d2c4cab830b78618dbd7f2663871e7c43d1cc79f85821388889e1680df5f3281b1acb0aba77e5538931b1c520438e726356f9f0ab0c4c955e856680f24f22e8cd7407b517a9135aa84e1da5e541ea06c097be749bf395f4f5a41f265b4ba974f11f0986d133d271e098807acccadf1674da8ebe2b2806acb9f66e21637e1f5413c879dc62783ce0356ab5df86224908bba32bd92f8c0f9295f76683edb72a16aa57a2da265a01c4c22ed536e45dbb899f97f80b90b", 0x1000, 0x0, &(0x7f0000001100)={0x0, 0x1c9c380}) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000001180)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r5, &(0x7f0000001500)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000400}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x28, r6, 0x200, 0x70bd28, 0x25dfdbfb, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x24040800}, 0x0) 07:31:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) 07:31:17 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000300)=0x7) 07:31:17 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) ioctl$BLKREPORTZONE(r3, 0xc0101282, &(0x7f0000000200)={0x7, 0x3, 0x0, [{0x3, 0x7ff, 0x7f, 0x101, 0x53e, 0x6, 0x100}, {0x1, 0x7, 0x7, 0xb2, 0xfff, 0x3, 0x5}, {0x3, 0x0, 0x6, 0x7325, 0x5, 0x10001, 0x80000001}]}) r4 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FBUF(r4, 0x8030560a, &(0x7f0000000000)={0x0, 0x0, 0x0}) [ 1164.395952][T22179] hfs: unable to parse mount options 07:31:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) 07:31:17 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) 07:31:17 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)) 07:31:17 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f0000000300)=0x7) 07:31:17 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) ioctl$BLKREPORTZONE(r3, 0xc0101282, &(0x7f0000000200)={0x7, 0x3, 0x0, [{0x3, 0x7ff, 0x7f, 0x101, 0x53e, 0x6, 0x100}, {0x1, 0x7, 0x7, 0xb2, 0xfff, 0x3, 0x5}, {0x3, 0x0, 0x6, 0x7325, 0x5, 0x10001, 0x80000001}]}) r4 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FBUF(r4, 0x8030560a, &(0x7f0000000000)={0x0, 0x0, 0x0}) 07:31:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1164.715669][T22196] hfs: unable to parse mount options 07:31:17 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) 07:31:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) 07:31:17 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f0000000300)=0x7) 07:31:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) ioctl$BLKREPORTZONE(r3, 0xc0101282, &(0x7f0000000200)={0x7, 0x3, 0x0, [{0x3, 0x7ff, 0x7f, 0x101, 0x53e, 0x6, 0x100}, {0x1, 0x7, 0x7, 0xb2, 0xfff, 0x3, 0x5}, {0x3, 0x0, 0x6, 0x7325, 0x5, 0x10001, 0x80000001}]}) r4 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FBUF(r4, 0x8030560a, &(0x7f0000000000)={0x0, 0x0, 0x0}) 07:31:18 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) 07:31:18 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)) [ 1164.928070][T22209] hfs: gid requires an argument [ 1164.946144][T22209] hfs: unable to parse mount options 07:31:18 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f0000000300)=0x7) [ 1164.988439][T22212] hfs: unable to parse mount options 07:31:18 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) 07:31:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(0x0, &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) 07:31:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:18 executing program 3: r0 = syz_open_dev$video(0x0, 0x3, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000300)=0x7) 07:31:18 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)) 07:31:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) ioctl$BLKREPORTZONE(r3, 0xc0101282, &(0x7f0000000200)={0x7, 0x3, 0x0, [{0x3, 0x7ff, 0x7f, 0x101, 0x53e, 0x6, 0x100}, {0x1, 0x7, 0x7, 0xb2, 0xfff, 0x3, 0x5}, {0x3, 0x0, 0x6, 0x7325, 0x5, 0x10001, 0x80000001}]}) syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) 07:31:18 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) [ 1165.236552][T22232] hfs: gid requires an argument [ 1165.273624][T22232] hfs: unable to parse mount options 07:31:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) ioctl$BLKREPORTZONE(r3, 0xc0101282, &(0x7f0000000200)={0x7, 0x3, 0x0, [{0x3, 0x7ff, 0x7f, 0x101, 0x53e, 0x6, 0x100}, {0x1, 0x7, 0x7, 0xb2, 0xfff, 0x3, 0x5}, {0x3, 0x0, 0x6, 0x7325, 0x5, 0x10001, 0x80000001}]}) 07:31:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(0x0, &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) 07:31:18 executing program 3: r0 = syz_open_dev$video(0x0, 0x3, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000300)=0x7) 07:31:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:18 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) 07:31:18 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)) 07:31:18 executing program 3: r0 = syz_open_dev$video(0x0, 0x3, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000300)=0x7) 07:31:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:31:18 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) 07:31:18 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000300)=0x7) [ 1165.546570][T22255] hfs: gid requires an argument 07:31:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(0x0, &(0x7f00000000c0)='./bus\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) 07:31:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) [ 1165.568887][T22255] hfs: unable to parse mount options 07:31:18 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000300)=0x7) 07:31:18 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) 07:31:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:18 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)) 07:31:18 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000300)=0x7) 07:31:18 executing program 3: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f0000000300)=0x7) 07:31:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) 07:31:18 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) [ 1165.779020][T22282] hfs: can't find a HFS filesystem on dev loop0 07:31:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:18 executing program 3: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f0000000300)=0x7) 07:31:18 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, r2, 0x0, 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)) [ 1165.989340][T22297] hfs: can't find a HFS filesystem on dev loop0 07:31:19 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:31:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="11dca5005e0bcfe57bf070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) 07:31:19 executing program 3: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f0000000300)=0x7) 07:31:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) 07:31:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:19 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, r2, 0x0, 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)) 07:31:19 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, 0x0) 07:31:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="11dca5005e0bcfe57bf070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) 07:31:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) 07:31:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="11dca5005e0bcfe57bf070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) [ 1166.562237][T22307] hfs: can't find a HFS filesystem on dev loop0 07:31:19 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, 0x0) 07:31:19 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, r2, 0x0, 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)) 07:31:20 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:31:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) 07:31:20 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, 0x0) 07:31:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="dca98890c62a4c207619f1035e07f4c5672d82f072db60292b33d4f6c1b62375a7f4c262d22ab054d657c6aea28c8703912789f3291855054f7e98901c70482700c213d6e52b74445d1c188399834e47a1da390d50383e1c1515df2986f23039558cf332348fdc", 0x67, 0xe000000000000000}, {&(0x7f0000000240)="8e5c6f8c2551d58bf03faf1b37be2aacf7893fb6be9b85c44a82f1b90f075ff766b09c126d6fd5d97ed579b7918e398e705575f1244cfe1e8c0d177840b07dd9c966ffbce3046395a3502ef12d0f6f83c3ecd7d159e744b1ab6e33247f793c60abd831ae909ce6", 0x67, 0x6}, {&(0x7f00000002c0)="9221b5c3103e6f695a6c95d951", 0xd, 0x5}, {&(0x7f0000000300)="d1ad9c8eed8aa96bf7507c3b3b128ed136be48ce8ca4e9bb8cf854586ec49ae08015dc04ae7e4a84e5f1eb58a416471f90e5b905f00510def747127500505d5a54", 0x41, 0x3ff}, {&(0x7f0000000380)="c606f5ee410cde84661cedc89e6d7576f89aef0793fa50d954cb34465d585be7428aa67eb2a83da691a01aaaf0d82b48088d31b8f44d4aea49157ac3a9cddfc17ab58897b53a6d4cc9ff5ea1970437c6277e1f4414b56977", 0x58, 0xffffffff}], 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) 07:31:20 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, r2, &(0x7f0000000300), 0x0) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)) 07:31:20 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000300)) 07:31:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) [ 1167.407046][T22336] hfs: gid requires an argument [ 1167.411915][T22336] hfs: unable to parse mount options [ 1167.473098][T22337] hfs: gid requires an argument [ 1167.485352][T22337] hfs: unable to parse mount options 07:31:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) 07:31:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:20 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000300)) 07:31:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) [ 1167.637110][T22348] hfs: gid requires an argument [ 1167.655190][T22348] hfs: unable to parse mount options [ 1167.699450][T22355] hfs: unable to parse mount options 07:31:21 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) dup3(0xffffffffffffffff, r1, 0x0) ppoll(&(0x7f00000001c0)=[{}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:31:21 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, r2, &(0x7f0000000300), 0x0) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)) 07:31:21 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000300)) 07:31:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) 07:31:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}, {@dir_umask={'dir_umask', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) 07:31:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) 07:31:21 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000300)) [ 1168.337357][T22363] hfs: gid requires an argument [ 1168.350865][T22368] hfs: unable to parse mount options [ 1168.361674][T22363] hfs: unable to parse mount options 07:31:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 07:31:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) 07:31:21 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, r2, &(0x7f0000000300), 0x0) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)) [ 1168.555399][T22379] hfs: can't find a HFS filesystem on dev loop1 [ 1168.563486][T22381] hfs: unable to parse mount options 07:31:22 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) dup3(0xffffffffffffffff, r1, 0x0) ppoll(&(0x7f00000001c0)=[{}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:31:22 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000300)) 07:31:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0b") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) 07:31:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 07:31:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid'}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:22 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, r2, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) 07:31:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0b") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) 07:31:22 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000300)) [ 1169.229431][T22394] hfs: unable to parse mount options [ 1169.238297][T22395] hfs: can't find a HFS filesystem on dev loop1 07:31:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid'}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 07:31:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0b") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) 07:31:22 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f0000000300)) [ 1169.453517][T22411] hfs: can't find a HFS filesystem on dev loop1 [ 1169.527767][T22413] hfs: unable to parse mount options 07:31:23 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) dup3(0xffffffffffffffff, r1, 0x0) ppoll(&(0x7f00000001c0)=[{}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:31:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) 07:31:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57b") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) 07:31:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid'}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:23 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f0000000300)) 07:31:23 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, r2, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) 07:31:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57b") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) 07:31:23 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f0000000300)) [ 1170.131120][T22426] hfs: unable to parse mount options [ 1170.133705][T22424] hfs: gid requires an argument [ 1170.141271][T22424] hfs: unable to parse mount options 07:31:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@gid={'gid', 0x3d, r1}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) 07:31:23 executing program 3: r0 = syz_open_dev$video(0x0, 0x3, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000300)) 07:31:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57b") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) [ 1170.311173][T22441] hfs: gid requires an argument [ 1170.327237][T22441] hfs: unable to parse mount options [ 1170.420999][T22445] hfs: unable to parse mount options 07:31:24 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:31:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@gid={'gid', 0x3d, r1}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf0") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) 07:31:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) 07:31:24 executing program 3: r0 = syz_open_dev$video(0x0, 0x3, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000300)) 07:31:24 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, r2, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000000)) 07:31:24 executing program 3: r0 = syz_open_dev$video(0x0, 0x3, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000300)) 07:31:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf0") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) [ 1171.066603][T22459] hfs: unable to parse mount options [ 1171.080504][T22456] hfs: gid requires an argument 07:31:24 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000300)) [ 1171.112598][T22456] hfs: unable to parse mount options 07:31:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) 07:31:24 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000300)) 07:31:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf0") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) [ 1171.331185][T22474] hfs: unable to parse mount options 07:31:24 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:31:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@gid={'gid', 0x3d, r1}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) 07:31:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid'}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) 07:31:24 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000300)) 07:31:24 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, r2, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, 0x0) 07:31:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) 07:31:25 executing program 3: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f0000000300)) [ 1171.982901][T22487] hfs: unable to parse mount options [ 1172.016352][T22490] hfs: gid requires an argument [ 1172.029088][T22490] hfs: unable to parse mount options 07:31:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid'}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) 07:31:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) 07:31:25 executing program 3: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f0000000300)) [ 1172.184711][T22501] hfs: unable to parse mount options [ 1172.330574][T22506] hfs: gid requires an argument [ 1172.354018][T22506] hfs: unable to parse mount options 07:31:25 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:31:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid'}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) 07:31:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) 07:31:25 executing program 3: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f0000000300)) 07:31:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:25 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, r2, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, 0x0) 07:31:25 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, 0x0) [ 1172.907499][T22512] hfs: unable to parse mount options [ 1172.928358][T22520] hfs: gid requires an argument 07:31:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) [ 1172.950137][T22520] hfs: unable to parse mount options 07:31:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@gid={'gid', 0x3d, r1}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) 07:31:26 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, 0x0) 07:31:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) [ 1173.124121][T22532] hfs: gid requires an argument [ 1173.135707][T22532] hfs: unable to parse mount options [ 1173.250260][T22538] hfs: gid requires an argument [ 1173.269791][T22538] hfs: unable to parse mount options 07:31:26 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000140)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) ppoll(&(0x7f00000001c0)=[{r1}, {}], 0x2, 0x0, 0x0, 0x0) 07:31:26 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, 0x0) 07:31:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@gid={'gid', 0x3d, r1}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) 07:31:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}], [{@permit_directio='permit_directio'}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, 0x0, 0x0) 07:31:26 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, r2, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, 0x0) 07:31:26 executing program 2: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, r2, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, 0x0) 07:31:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0b") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) [ 1173.799084][T22544] hfs: gid requires an argument [ 1173.816079][T22550] hfs: gid requires an argument [ 1173.821031][T22550] hfs: unable to parse mount options [ 1173.832062][T22544] hfs: unable to parse mount options 07:31:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@gid={'gid', 0x3d, r1}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}) 07:31:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1173.997676][T22563] hfs: gid requires an argument [ 1174.008239][T22563] hfs: unable to parse mount options 07:31:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="11dca5005e0bcfe57bf070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0xfff, 0x2) 07:31:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}, {@permit_directio='permit_directio'}]}) [ 1174.079210][T22566] hfs: gid requires an argument [ 1174.111078][T22566] hfs: unable to parse mount options [ 1174.197092][T22570] hfs: gid requires an argument [ 1174.214700][T22570] hfs: unable to parse mount options 07:31:27 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000140)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) ppoll(&(0x7f00000001c0)=[{r1}, {}], 0x2, 0x0, 0x0, 0x0) 07:31:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) 07:31:27 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, r2, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)={0x1, 0x0, 0x1000, 0x0, 0x0}) 07:31:27 executing program 2: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, r2, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, 0x0) [ 1174.765824][T22579] hfs: gid requires an argument [ 1174.771429][T22577] hfs: gid requires an argument [ 1174.780002][T22577] hfs: unable to parse mount options [ 1174.782059][T22582] hfs: can't find a HFS filesystem on dev loop3 [ 1174.801591][T22579] hfs: unable to parse mount options 07:31:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}]}) 07:31:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1175.088933][T22594] hfs: gid requires an argument [ 1175.102807][T22594] hfs: unable to parse mount options [ 1175.117103][T22598] hfs: gid requires an argument [ 1175.129870][T22598] hfs: unable to parse mount options 07:31:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}], [{@permit_directio='permit_directio'}]}) [ 1175.245950][T22602] hfs: can't find a HFS filesystem on dev loop3 [ 1175.308347][T22606] hfs: gid requires an argument [ 1175.356706][T22606] hfs: unable to parse mount options [ 1175.358504][T22610] hfs: gid requires an argument [ 1175.373516][T22610] hfs: unable to parse mount options 07:31:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1175.516640][T22613] hfs: can't find a HFS filesystem on dev loop3 07:31:28 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000140)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) ppoll(&(0x7f00000001c0)=[{r1}, {}], 0x2, 0x0, 0x0, 0x0) 07:31:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:31:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) ioctl(r0, 0x0, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:28 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, r2, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)={0x1, 0x0, 0x1000, 0x0, 0x0}) 07:31:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1175.667035][T22618] hfs: gid requires an argument [ 1175.679164][T22619] hfs: gid requires an argument [ 1175.701902][T22618] hfs: unable to parse mount options [ 1175.708366][T22619] hfs: unable to parse mount options [ 1175.730964][T22625] hfs: can't find a HFS filesystem on dev loop3 07:31:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) ioctl(r0, 0x0, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) 07:31:28 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x400000401, 0x2) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000000)={0x0, 0x0, 0x0, {0x0, 0x0, 0x41495043}}) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000040)={0x3, [0x2, 0x8, 0x8, 0x7, 0x4, 0x8, 0x7, 0xfffffffffffff801, 0x7, 0x7, 0x800, 0xfffffffffffffff9, 0x6, 0x6, 0x3c, 0xce, 0x5bd42762, 0x80000001, 0x9, 0x80000001, 0x5, 0x40, 0x9, 0x5, 0x7fffffff, 0x7, 0x5518, 0x0, 0x0, 0x1f, 0x2, 0x8001, 0x7, 0x1, 0x10001, 0x81, 0xa70000000000000, 0x6, 0x6, 0x6, 0x0, 0x98, 0x72, 0x20, 0x7, 0x2ce05702, 0x20, 0x5]}) 07:31:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1175.888506][T22632] hfs: gid requires an argument [ 1175.893520][T22632] hfs: unable to parse mount options 07:31:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) ioctl(r0, 0x0, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1175.988893][T22636] hfs: gid requires an argument [ 1176.017008][T22636] hfs: unable to parse mount options 07:31:29 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x400000401, 0x2) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000000)={0x0, 0x0, 0x0, {0x0, 0x0, 0x41495043}}) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000040)={0x3, [0x2, 0x8, 0x8, 0x7, 0x4, 0x8, 0x7, 0xfffffffffffff801, 0x7, 0x7, 0x800, 0xfffffffffffffff9, 0x6, 0x6, 0x3c, 0xce, 0x5bd42762, 0x80000001, 0x9, 0x80000001, 0x5, 0x40, 0x9, 0x5, 0x7fffffff, 0x7, 0x5518, 0x0, 0x0, 0x1f, 0x2, 0x8001, 0x7, 0x1, 0x10001, 0x81, 0xa70000000000000, 0x6, 0x6, 0x6, 0x0, 0x98, 0x72, 0x20, 0x7, 0x2ce05702, 0x20, 0x5]}) 07:31:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) [ 1176.139364][T22641] hfs: can't find a HFS filesystem on dev loop3 [ 1176.148597][T22643] hfs: gid requires an argument [ 1176.196791][T22643] hfs: unable to parse mount options [ 1176.308716][T22650] hfs: gid requires an argument [ 1176.352169][T22650] hfs: unable to parse mount options 07:31:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) ppoll(&(0x7f00000001c0)=[{r1}, {r0}], 0x2, 0x0, 0x0, 0x0) 07:31:29 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x400000401, 0x2) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000000)={0x0, 0x0, 0x0, {0x0, 0x0, 0x41495043}}) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000040)={0x3, [0x2, 0x8, 0x8, 0x7, 0x4, 0x8, 0x7, 0xfffffffffffff801, 0x7, 0x7, 0x800, 0xfffffffffffffff9, 0x6, 0x6, 0x3c, 0xce, 0x5bd42762, 0x80000001, 0x9, 0x80000001, 0x5, 0x40, 0x9, 0x5, 0x7fffffff, 0x7, 0x5518, 0x0, 0x0, 0x1f, 0x2, 0x8001, 0x7, 0x1, 0x10001, 0x81, 0xa70000000000000, 0x6, 0x6, 0x6, 0x0, 0x98, 0x72, 0x20, 0x7, 0x2ce05702, 0x20, 0x5]}) 07:31:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 07:31:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) ioctl(r0, 0x1000008912, 0x0) 07:31:29 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, r2, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)={0x1, 0x0, 0x1000, 0x0, 0x0}) 07:31:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) 07:31:29 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x400000401, 0x2) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000000)={0x0, 0x0, 0x0, {0x0, 0x0, 0x41495043}}) [ 1176.590433][T22655] hfs: gid requires an argument [ 1176.591649][T22660] hfs: gid requires an argument [ 1176.602159][T22655] hfs: unable to parse mount options [ 1176.607615][T22653] hfs: can't find a HFS filesystem on dev loop3 [ 1176.615765][T22660] hfs: unable to parse mount options 07:31:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) ppoll(&(0x7f00000001c0)=[{r1}, {r0}], 0x2, 0x0, 0x0, 0x0) 07:31:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) ioctl(r0, 0x1000008912, 0x0) 07:31:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) ppoll(&(0x7f00000001c0)=[{r1}, {r0}], 0x2, 0x0, 0x0, 0x0) 07:31:29 executing program 1: ioctl$VIDIOC_G_FBUF(0xffffffffffffffff, 0x8030560a, &(0x7f0000000000)={0x0, 0x0, 0x0, {0x0, 0x0, 0x41495043}}) 07:31:29 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid'}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) [ 1176.826744][T22672] hfs: gid requires an argument [ 1176.831774][T22672] hfs: unable to parse mount options 07:31:29 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) ppoll(&(0x7f00000001c0)=[{r1}, {r0}], 0x2, 0x0, 0x0, 0x0) 07:31:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) ioctl(r0, 0x1000008912, 0x0) [ 1176.931673][T22680] hfs: can't find a HFS filesystem on dev loop3 07:31:30 executing program 1: ioctl$VIDIOC_G_FBUF(0xffffffffffffffff, 0x8030560a, &(0x7f0000000000)={0x0, 0x0, 0x0, {0x0, 0x0, 0x41495043}}) [ 1177.009091][T22684] hfs: unable to parse mount options [ 1177.105422][T22692] hfs: gid requires an argument [ 1177.117025][T22692] hfs: unable to parse mount options 07:31:30 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, r2, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)={0x1, 0x0, 0x1000, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0}) 07:31:30 executing program 1: ioctl$VIDIOC_G_FBUF(0xffffffffffffffff, 0x8030560a, &(0x7f0000000000)={0x0, 0x0, 0x0, {0x0, 0x0, 0x41495043}}) 07:31:30 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:30 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid'}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) 07:31:30 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) ppoll(&(0x7f00000001c0)=[{r1}, {r0}], 0x2, 0x0, 0x0, 0x0) 07:31:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)) 07:31:30 executing program 1: r0 = syz_open_dev$video(0x0, 0x400000401, 0x2) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000000)={0x0, 0x0, 0x0, {0x0, 0x0, 0x41495043}}) [ 1177.347086][T22697] hfs: unable to parse mount options [ 1177.363829][T22707] hfs: gid requires an argument 07:31:30 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) ppoll(&(0x7f00000001c0)=[{r1}, {r0}], 0x2, 0x0, 0x0, 0x0) 07:31:30 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid'}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) [ 1177.396426][T22704] hfs: can't find a HFS filesystem on dev loop3 [ 1177.411568][T22707] hfs: unable to parse mount options 07:31:30 executing program 1: r0 = syz_open_dev$video(0x0, 0x400000401, 0x2) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000000)={0x0, 0x0, 0x0, {0x0, 0x0, 0x41495043}}) 07:31:30 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)) [ 1177.550766][T22719] hfs: unable to parse mount options [ 1177.633166][T22724] hfs: can't find a HFS filesystem on dev loop3 [ 1177.714305][T22727] hfs: gid requires an argument [ 1177.725485][T22727] hfs: unable to parse mount options 07:31:31 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, r2, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)={0x1, 0x0, 0x1000, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0}) 07:31:31 executing program 1: r0 = syz_open_dev$video(0x0, 0x400000401, 0x2) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000000)={0x0, 0x0, 0x0, {0x0, 0x0, 0x41495043}}) 07:31:31 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:31:31 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r0}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) 07:31:31 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)) 07:31:31 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000000)={0x0, 0x0, 0x0, {0x0, 0x0, 0x41495043}}) 07:31:31 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) [ 1178.129178][T22737] hfs: unable to parse mount options [ 1178.132585][T22741] hfs: can't find a HFS filesystem on dev loop3 07:31:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(0x0, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1178.183594][T22738] hfs: gid requires an argument [ 1178.202223][T22738] hfs: unable to parse mount options 07:31:31 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000000)={0x0, 0x0, 0x0, {0x0, 0x0, 0x41495043}}) 07:31:31 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:31:31 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r0}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) [ 1178.424040][T22763] hfs: unable to parse mount options 07:31:31 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, r2, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)={0x1, 0x0, 0x1000, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0}) 07:31:31 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000000)={0x0, 0x0, 0x0, {0x0, 0x0, 0x41495043}}) 07:31:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0b") 07:31:31 executing program 4: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) ppoll(&(0x7f00000001c0)=[{r1}, {r0}], 0x2, 0x0, 0x0, 0x0) 07:31:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(0x0, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:31 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r0}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) [ 1178.799028][T22769] hfs: unable to parse mount options 07:31:31 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x400000401, 0x0) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000000)={0x0, 0x0, 0x0, {0x0, 0x0, 0x41495043}}) 07:31:31 executing program 4: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) ppoll(&(0x7f00000001c0)=[{r1}, {r0}], 0x2, 0x0, 0x0, 0x0) 07:31:31 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r0}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) [ 1178.923563][T22777] hfs: gid requires an argument 07:31:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(0x0, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:32 executing program 1: syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x400000401, 0x0) ioctl$VIDIOC_G_FBUF(0xffffffffffffffff, 0x8030560a, &(0x7f0000000000)={0x0, 0x0, 0x0, {0x0, 0x0, 0x41495043}}) [ 1178.954423][T22777] hfs: unable to parse mount options [ 1178.967327][T22788] hfs: unable to parse mount options 07:31:32 executing program 4: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) ppoll(&(0x7f00000001c0)=[{r1}, {r0}], 0x2, 0x0, 0x0, 0x0) 07:31:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0b") 07:31:32 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r0}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) 07:31:32 executing program 1: syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x400000401, 0x0) ioctl$VIDIOC_G_FBUF(0xffffffffffffffff, 0x8030560a, &(0x7f0000000000)={0x0, 0x0, 0x0, {0x0, 0x0, 0x41495043}}) 07:31:32 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) ppoll(&(0x7f00000001c0)=[{r1}, {r0}], 0x2, 0x0, 0x0, 0x0) 07:31:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:32 executing program 1: syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x400000401, 0x0) ioctl$VIDIOC_G_FBUF(0xffffffffffffffff, 0x8030560a, &(0x7f0000000000)={0x0, 0x0, 0x0, {0x0, 0x0, 0x41495043}}) 07:31:32 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, r2, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)={0x1, 0x0, 0x1000, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0}) 07:31:32 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) ppoll(&(0x7f00000001c0)=[{r1}, {r0}], 0x2, 0x0, 0x0, 0x0) 07:31:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1179.670007][T22803] hfs: gid requires an argument [ 1179.686769][T22802] hfs: unable to parse mount options [ 1179.708839][T22803] hfs: unable to parse mount options 07:31:32 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x400000401, 0x0) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, 0x0) 07:31:32 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r0}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) 07:31:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0b") 07:31:32 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) ppoll(&(0x7f00000001c0)=[{r1}, {r0}], 0x2, 0x0, 0x0, 0x0) 07:31:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1179.888216][T22828] hfs: unable to parse mount options 07:31:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f00000004c0)) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid'}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) 07:31:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) [ 1180.013440][T22834] hfs: gid requires an argument [ 1180.030913][T22834] hfs: unable to parse mount options [ 1180.048657][T22842] hfs: can't find a HFS filesystem on dev loop1 [ 1180.061331][T22845] hfs: unable to parse mount options 07:31:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:31:33 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, r2, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)={0x1, 0x0, 0x1000, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0}) 07:31:33 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57b") 07:31:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f00000004c0)) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid'}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) 07:31:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:31:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) [ 1180.445926][T22855] hfs: gid requires an argument [ 1180.451597][T22854] hfs: unable to parse mount options [ 1180.453747][T22862] hfs: can't find a HFS filesystem on dev loop1 [ 1180.466273][T22861] hfs: can't find a HFS filesystem on dev loop3 [ 1180.473478][T22855] hfs: unable to parse mount options 07:31:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f00000004c0)) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid'}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) 07:31:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57b") 07:31:33 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1180.673481][T22875] hfs: unable to parse mount options 07:31:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) 07:31:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1180.789067][T22879] hfs: gid requires an argument [ 1180.798872][T22880] hfs: can't find a HFS filesystem on dev loop3 [ 1180.809695][T22879] hfs: unable to parse mount options [ 1180.834298][T22887] hfs: unable to parse mount options [ 1180.983683][T22885] hfs: can't find a HFS filesystem on dev loop1 07:31:34 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) ppoll(&(0x7f00000001c0)=[{r1}, {r0}], 0x2, 0x0, 0x0, 0x0) 07:31:34 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) 07:31:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57b") 07:31:34 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1181.254963][T22893] hfs: can't find a HFS filesystem on dev loop3 07:31:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1181.323635][T22895] hfs: unable to parse mount options [ 1181.333098][T22899] hfs: gid requires an argument [ 1181.342099][T22899] hfs: unable to parse mount options [ 1181.348214][T22901] hfs: can't find a HFS filesystem on dev loop1 07:31:34 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:31:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) 07:31:34 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, r2, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)={0x1, 0x0, 0x1000, 0x0, 0x0}) 07:31:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf0") 07:31:34 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1181.498560][T22909] hfs: can't find a HFS filesystem on dev loop3 07:31:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1181.565914][T22917] hfs: unable to parse mount options [ 1181.584682][T22920] hfs: gid requires an argument [ 1181.589572][T22920] hfs: unable to parse mount options 07:31:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(0x0, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) [ 1181.678803][T22922] hfs: can't find a HFS filesystem on dev loop1 07:31:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf0") 07:31:34 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1181.727585][T22928] hfs: can't find a HFS filesystem on dev loop3 07:31:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(0x0, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) [ 1181.886808][T22936] hfs: gid requires an argument [ 1181.892236][T22936] hfs: unable to parse mount options 07:31:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf0") [ 1181.977428][T22940] hfs: can't find a HFS filesystem on dev loop3 [ 1182.045707][T22943] hfs: can't find a HFS filesystem on dev loop1 [ 1182.119959][T22950] hfs: gid requires an argument [ 1182.166304][T22950] hfs: unable to parse mount options 07:31:35 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:31:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, 0x0) [ 1182.361559][T22955] hfs: can't find a HFS filesystem on dev loop3 07:31:35 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, r2, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)={0x1, 0x0, 0x1000, 0x0, 0x0}) 07:31:35 executing program 1: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(0x0, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) 07:31:35 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5f64, 0x400000) r1 = socket$rds(0x15, 0x5, 0x0) getsockname(r1, &(0x7f0000000040)=@nfc_llcp, &(0x7f0000000100)=0x80) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000000)={0x0, 0x0, 0x0}) socketpair(0x3, 0x4, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) connect$vsock_dgram(r2, &(0x7f0000000180)={0x28, 0x0, 0x2710, @reserved}, 0x10) 07:31:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, 0x0) 07:31:35 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5f64, 0x400000) r1 = socket$rds(0x15, 0x5, 0x0) getsockname(r1, &(0x7f0000000040)=@nfc_llcp, &(0x7f0000000100)=0x80) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000000)={0x0, 0x0, 0x0}) socketpair(0x3, 0x4, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) connect$vsock_dgram(r2, &(0x7f0000000180)={0x28, 0x0, 0x2710, @reserved}, 0x10) [ 1182.486645][T22964] hfs: can't find a HFS filesystem on dev loop1 07:31:35 executing program 1: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) [ 1182.597354][T22973] hfs: can't find a HFS filesystem on dev loop3 07:31:35 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5f64, 0x400000) r1 = socket$rds(0x15, 0x5, 0x0) getsockname(r1, &(0x7f0000000040)=@nfc_llcp, &(0x7f0000000100)=0x80) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000000)={0x0, 0x0, 0x0}) socketpair(0x3, 0x4, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) connect$vsock_dgram(r2, &(0x7f0000000180)={0x28, 0x0, 0x2710, @reserved}, 0x10) 07:31:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, 0x0) [ 1182.773865][T22988] hfs: can't find a HFS filesystem on dev loop3 [ 1182.775084][T22984] hfs: can't find a HFS filesystem on dev loop1 07:31:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:31:36 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5f64, 0x400000) r1 = socket$rds(0x15, 0x5, 0x0) getsockname(r1, &(0x7f0000000040)=@nfc_llcp, &(0x7f0000000100)=0x80) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000000)={0x0, 0x0, 0x0}) socketpair(0x3, 0x4, 0x9, &(0x7f0000000140)) 07:31:36 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x100) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000140)='ramfs\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x6857b21ff1155d91) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) sendfile(r2, r2, &(0x7f0000000300), 0x7fff) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000000)={0x1, 0x0, 0x1000, 0x0, 0x0}) 07:31:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) 07:31:36 executing program 1: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)) 07:31:36 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5f64, 0x400000) r1 = socket$rds(0x15, 0x5, 0x0) getsockname(r1, &(0x7f0000000040)=@nfc_llcp, &(0x7f0000000100)=0x80) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000000)={0x0, 0x0, 0x0}) 07:31:36 executing program 0: syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5f64, 0x400000) r0 = socket$rds(0x15, 0x5, 0x0) getsockname(r0, &(0x7f0000000040)=@nfc_llcp, &(0x7f0000000100)=0x80) [ 1183.309799][T22998] hfs: can't find a HFS filesystem on dev loop1 07:31:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) 07:31:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(0x0, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1183.405974][T23000] hfs: can't find a HFS filesystem on dev loop3 07:31:36 executing program 0: syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5f64, 0x400000) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@nfc_llcp, &(0x7f0000000100)=0x80) 07:31:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)) [ 1183.692282][T23027] hfs: can't find a HFS filesystem on dev loop3 07:31:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 07:31:37 executing program 0: syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5f64, 0x400000) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@nfc_llcp, &(0x7f0000000100)=0x80) 07:31:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:31:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(0x0, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:37 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:31:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)) 07:31:37 executing program 0: syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5f64, 0x400000) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@nfc_llcp, &(0x7f0000000100)=0x80) [ 1184.054859][T23031] hfs: can't find a HFS filesystem on dev loop2 07:31:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 07:31:37 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) getsockname(r0, &(0x7f0000000040)=@nfc_llcp, &(0x7f0000000100)=0x80) [ 1184.170004][T23040] hfs: can't find a HFS filesystem on dev loop3 07:31:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(0x0, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:37 executing program 0: socket$rds(0x15, 0x5, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@nfc_llcp, &(0x7f0000000100)=0x80) 07:31:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:31:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0b") [ 1184.386297][T23052] hfs: can't find a HFS filesystem on dev loop2 07:31:37 executing program 0: socket$rds(0x15, 0x5, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@nfc_llcp, &(0x7f0000000100)=0x80) 07:31:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1184.557743][T23066] hfs: can't find a HFS filesystem on dev loop3 [ 1184.665020][T23077] hfs: can't find a HFS filesystem on dev loop2 07:31:37 executing program 0: socket$rds(0x15, 0x5, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@nfc_llcp, &(0x7f0000000100)=0x80) 07:31:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:31:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0b") 07:31:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:37 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:31:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) 07:31:38 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) getsockname(r0, 0x0, &(0x7f0000000100)) 07:31:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1184.999805][T23083] hfs: can't find a HFS filesystem on dev loop3 [ 1185.014895][T23089] hfs: unable to parse mount options 07:31:38 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) getsockname(r0, 0x0, 0x0) 07:31:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0b") 07:31:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) 07:31:38 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:31:38 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) getsockname(r0, 0x0, 0x0) 07:31:38 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1185.252488][T23108] hfs: can't find a HFS filesystem on dev loop3 07:31:38 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) getsockname(r0, 0x0, 0x0) 07:31:38 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) [ 1185.316381][T23111] hfs: unable to parse mount options [ 1185.418794][T23118] hfs: can't find a HFS filesystem on dev loop1 07:31:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, 0x0) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:31:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) 07:31:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57b") 07:31:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) pipe(&(0x7f0000000300)) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000200)={0x0, r0+30000000}, 0x0) 07:31:38 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:38 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) [ 1185.876136][T23134] hfs: unable to parse mount options 07:31:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid'}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) 07:31:39 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) [ 1185.974636][T23136] hfs: can't find a HFS filesystem on dev loop3 [ 1185.994847][T23130] hfs: can't find a HFS filesystem on dev loop1 07:31:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57b") 07:31:39 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:39 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) [ 1186.172888][T23146] hfs: unable to parse mount options 07:31:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid'}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) [ 1186.234662][T23152] hfs: can't find a HFS filesystem on dev loop3 [ 1186.294537][T23156] hfs: can't find a HFS filesystem on dev loop1 [ 1186.427294][T23164] hfs: unable to parse mount options 07:31:39 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, 0x0) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:31:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57b") 07:31:39 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:31:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid'}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) 07:31:39 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1186.768650][T23168] hfs: can't find a HFS filesystem on dev loop1 [ 1186.778423][T23174] hfs: can't find a HFS filesystem on dev loop3 [ 1186.792749][T23170] hfs: unable to parse mount options [ 1186.836527][T23172] hfs: can't find a HFS filesystem on dev loop0 07:31:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@gid={'gid', 0x3d, r1}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) 07:31:40 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:31:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf0") 07:31:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) pipe(&(0x7f0000000440)) r0 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x88002) write$sndseq(r0, 0x0, 0xffffff67) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x3000000}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) [ 1187.099253][T23187] hfs: can't find a HFS filesystem on dev loop1 07:31:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1187.227205][T23197] hfs: gid requires an argument [ 1187.237481][T23195] hfs: can't find a HFS filesystem on dev loop3 [ 1187.258010][T23197] hfs: unable to parse mount options [ 1187.375238][T23203] hfs: can't find a HFS filesystem on dev loop1 07:31:40 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, 0x0) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:31:40 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:31:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf0") 07:31:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) pipe(&(0x7f0000000440)) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x88002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x9}, &(0x7f0000000200)={0x0, r0+30000000}, 0x0) 07:31:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@gid={'gid', 0x3d, r1}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) 07:31:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, 0x0) [ 1187.639105][T23211] hfs: can't find a HFS filesystem on dev loop1 [ 1187.707392][T23210] hfs: can't find a HFS filesystem on dev loop3 [ 1187.717562][T23217] hfs: gid requires an argument [ 1187.727961][T23217] hfs: unable to parse mount options 07:31:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, 0x0) 07:31:40 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:31:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf0") 07:31:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@gid={'gid', 0x3d, r1}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}, {@appraise='appraise'}]}) [ 1187.929713][T23225] hfs: can't find a HFS filesystem on dev loop1 07:31:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, 0x0) 07:31:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) [ 1188.117985][T23233] hfs: gid requires an argument [ 1188.120774][T23232] hfs: can't find a HFS filesystem on dev loop3 [ 1188.126606][T23233] hfs: unable to parse mount options [ 1188.277352][T23239] hfs: can't find a HFS filesystem on dev loop1 07:31:41 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(0xffffffffffffffff, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:31:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0xe0000, 0x0) 07:31:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x34, 0x62, 0x32, 0x65, 0x39, 0x35, 0x796774493b38b279], 0x2d, [0x38, 0x62, 0x35], 0x2d, [0x34, 0xb8a43f3fc06acb6d, 0x30, 0x38], 0x2d, [0x34, 0x64, 0x64, 0x64], 0x2d, [0x32, 0x0, 0x38, 0x35, 0x38, 0x36, 0x36, 0x37]}}}]}) 07:31:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:31:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)) 07:31:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) pipe(&(0x7f0000000300)) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x900}, &(0x7f0000000200)={0x0, r0+30000000}, 0x0) [ 1188.596652][T23247] hfs: gid requires an argument [ 1188.601533][T23247] hfs: unable to parse mount options 07:31:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:31:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0xe0000, 0x0) 07:31:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}], [{@permit_directio='permit_directio'}]}) [ 1188.753070][T23251] hfs: can't find a HFS filesystem on dev loop1 07:31:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)) 07:31:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0xe0000, 0x0) [ 1188.993297][T23267] hfs: gid requires an argument 07:31:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) [ 1189.018440][T23267] hfs: unable to parse mount options [ 1189.083738][T23272] hfs: can't find a HFS filesystem on dev loop1 07:31:42 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(0xffffffffffffffff, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:31:42 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0xe0000, 0x0) 07:31:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:31:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)) 07:31:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:31:42 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000000)={0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) 07:31:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) pipe(&(0x7f0000000440)) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x900000000000000}, &(0x7f0000000200)={0x0, r0+30000000}, 0x0) [ 1189.480618][T23283] hfs: gid requires an argument [ 1189.492128][T23283] hfs: unable to parse mount options [ 1189.603907][T23285] hfs: can't find a HFS filesystem on dev loop1 07:31:42 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0xe0000, 0x0) 07:31:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:31:42 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000000)={0x0, 0x4000, 0x0}) 07:31:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0b") 07:31:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) pipe(&(0x7f0000000440)) r0 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x88002) write$sndseq(r0, 0x0, 0xffffff67) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) [ 1189.935628][T23309] hfs: can't find a HFS filesystem on dev loop1 07:31:43 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(0xffffffffffffffff, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:31:43 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0xe0000, 0x0) 07:31:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:31:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0b") 07:31:43 executing program 2 (fault-call:2 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) [ 1190.390251][T23320] FAULT_INJECTION: forcing a failure. [ 1190.390251][T23320] name failslab, interval 1, probability 0, space 0, times 0 [ 1190.406569][T23320] CPU: 0 PID: 23320 Comm: syz-executor.2 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1190.415680][T23320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1190.425780][T23320] Call Trace: [ 1190.429101][T23320] dump_stack+0x172/0x1f0 [ 1190.433460][T23320] should_fail.cold+0xa/0x15 [ 1190.438058][T23320] ? fault_create_debugfs_attr+0x180/0x180 [ 1190.443883][T23320] ? page_to_nid.part.0+0x20/0x20 [ 1190.448913][T23320] ? ___might_sleep+0x163/0x280 [ 1190.453780][T23320] __should_failslab+0x121/0x190 [ 1190.458733][T23320] should_failslab+0x9/0x14 [ 1190.463233][T23320] __kmalloc+0x2e0/0x770 [ 1190.467508][T23320] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1190.473765][T23320] ? fput_many+0x12c/0x1a0 [ 1190.478199][T23320] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1190.484449][T23320] ? strnlen_user+0x1ed/0x2e0 [ 1190.489151][T23320] ? __x64_sys_memfd_create+0x13c/0x470 [ 1190.494702][T23320] __x64_sys_memfd_create+0x13c/0x470 [ 1190.500122][T23320] ? switch_fpu_return+0x1fa/0x4f0 [ 1190.505240][T23320] ? memfd_fcntl+0x18c0/0x18c0 [ 1190.510018][T23320] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1190.520440][T23320] ? trace_hardirqs_off_caller+0x65/0x230 [ 1190.526340][T23320] ? trace_hardirqs_on+0x67/0x240 [ 1190.531373][T23320] do_syscall_64+0xfa/0x760 [ 1190.535886][T23320] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1190.542219][T23320] RIP: 0033:0x459829 [ 1190.546117][T23320] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1190.565730][T23320] RSP: 002b:00007fcb3b193a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1190.574153][T23320] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1190.582126][T23320] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 07:31:43 executing program 0 (fault-call:1 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1190.590094][T23320] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1190.598064][T23320] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcb3b1946d4 [ 1190.606032][T23320] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:31:43 executing program 2 (fault-call:2 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) [ 1190.641496][T23318] hfs: can't find a HFS filesystem on dev loop1 [ 1190.747564][T23329] FAULT_INJECTION: forcing a failure. [ 1190.747564][T23329] name failslab, interval 1, probability 0, space 0, times 0 [ 1190.762752][T23329] CPU: 1 PID: 23329 Comm: syz-executor.0 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1190.771877][T23329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1190.781931][T23329] Call Trace: [ 1190.785238][T23329] dump_stack+0x172/0x1f0 [ 1190.789578][T23329] should_fail.cold+0xa/0x15 [ 1190.794185][T23329] ? fault_create_debugfs_attr+0x180/0x180 [ 1190.800066][T23329] ? page_to_nid.part.0+0x20/0x20 [ 1190.805094][T23329] ? ___might_sleep+0x163/0x280 [ 1190.809947][T23329] __should_failslab+0x121/0x190 [ 1190.820477][T23329] should_failslab+0x9/0x14 [ 1190.827065][T23329] __kmalloc+0x2e0/0x770 [ 1190.831309][T23329] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1190.837554][T23329] ? fput_many+0x12c/0x1a0 [ 1190.841969][T23329] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1190.848204][T23329] ? strnlen_user+0x1ed/0x2e0 [ 1190.852885][T23329] ? __x64_sys_memfd_create+0x13c/0x470 [ 1190.858434][T23329] __x64_sys_memfd_create+0x13c/0x470 [ 1190.863808][T23329] ? switch_fpu_return+0x1fa/0x4f0 [ 1190.868924][T23329] ? memfd_fcntl+0x18c0/0x18c0 [ 1190.873687][T23329] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1190.879760][T23329] ? trace_hardirqs_off_caller+0x65/0x230 [ 1190.885486][T23329] ? trace_hardirqs_on+0x67/0x240 [ 1190.890516][T23329] do_syscall_64+0xfa/0x760 [ 1190.895032][T23329] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1190.900920][T23329] RIP: 0033:0x459829 [ 1190.904819][T23329] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1190.924427][T23329] RSP: 002b:00007fb6eb999a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1190.932845][T23329] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1190.940840][T23329] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1190.948812][T23329] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1190.956783][T23329] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb6eb99a6d4 [ 1190.964754][T23329] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:31:44 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0xe0000, 0x0) [ 1190.994569][T23331] FAULT_INJECTION: forcing a failure. [ 1190.994569][T23331] name failslab, interval 1, probability 0, space 0, times 0 07:31:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0b") 07:31:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) [ 1191.035048][T23331] CPU: 0 PID: 23331 Comm: syz-executor.2 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1191.044190][T23331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1191.054248][T23331] Call Trace: [ 1191.057554][T23331] dump_stack+0x172/0x1f0 [ 1191.061897][T23331] should_fail.cold+0xa/0x15 [ 1191.066490][T23331] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1191.072573][T23331] ? fault_create_debugfs_attr+0x180/0x180 [ 1191.078392][T23331] ? page_to_nid.part.0+0x20/0x20 07:31:44 executing program 0 (fault-call:1 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1191.083414][T23331] ? ___might_sleep+0x163/0x280 [ 1191.088267][T23331] __should_failslab+0x121/0x190 [ 1191.093211][T23331] ? shmem_destroy_inode+0x80/0x80 [ 1191.098329][T23331] should_failslab+0x9/0x14 [ 1191.102856][T23331] kmem_cache_alloc+0x2aa/0x710 [ 1191.107739][T23331] ? __alloc_fd+0x487/0x620 [ 1191.112238][T23331] ? __kasan_check_read+0x11/0x20 [ 1191.112253][T23331] ? shmem_destroy_inode+0x80/0x80 [ 1191.112264][T23331] shmem_alloc_inode+0x1c/0x50 [ 1191.112279][T23331] alloc_inode+0x68/0x1e0 [ 1191.112292][T23331] new_inode_pseudo+0x19/0xf0 [ 1191.112305][T23331] new_inode+0x1f/0x40 [ 1191.112318][T23331] shmem_get_inode+0x84/0x7e0 [ 1191.112335][T23331] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1191.112350][T23331] shmem_file_setup+0x66/0x90 [ 1191.112373][T23331] __x64_sys_memfd_create+0x2a2/0x470 [ 1191.122483][T23331] ? memfd_fcntl+0x18c0/0x18c0 [ 1191.122502][T23331] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1191.122518][T23331] ? trace_hardirqs_off_caller+0x65/0x230 [ 1191.122533][T23331] ? trace_hardirqs_on+0x67/0x240 07:31:44 executing program 2 (fault-call:2 fault-nth:2): r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) [ 1191.122555][T23331] do_syscall_64+0xfa/0x760 [ 1191.131624][T23331] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1191.131635][T23331] RIP: 0033:0x459829 [ 1191.131651][T23331] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1191.131658][T23331] RSP: 002b:00007fcb3b193a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1191.140376][T23331] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1191.140384][T23331] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1191.140393][T23331] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1191.140401][T23331] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcb3b1946d4 [ 1191.140409][T23331] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 [ 1191.287761][T23344] FAULT_INJECTION: forcing a failure. [ 1191.287761][T23344] name failslab, interval 1, probability 0, space 0, times 0 [ 1191.307752][T23346] FAULT_INJECTION: forcing a failure. [ 1191.307752][T23346] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1191.320981][T23346] CPU: 1 PID: 23346 Comm: syz-executor.2 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1191.330123][T23346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1191.340179][T23346] Call Trace: [ 1191.343484][T23346] dump_stack+0x172/0x1f0 [ 1191.347828][T23346] should_fail.cold+0xa/0x15 [ 1191.352434][T23346] ? fault_create_debugfs_attr+0x180/0x180 [ 1191.358258][T23346] ? stack_trace_save+0xac/0xe0 [ 1191.363123][T23346] should_fail_alloc_page+0x50/0x60 [ 1191.368332][T23346] __alloc_pages_nodemask+0x1a1/0x900 [ 1191.373713][T23346] ? lock_downgrade+0x920/0x920 [ 1191.378571][T23346] ? __alloc_pages_slowpath+0x2530/0x2530 [ 1191.384304][T23346] ? memcg_kmem_get_cache+0x275/0x7b0 [ 1191.389685][T23346] ? rcu_read_unlock+0x33/0x60 [ 1191.394455][T23346] ? memcg_kmem_get_cache+0x344/0x7b0 [ 1191.399833][T23346] cache_grow_begin+0x90/0xd20 [ 1191.404602][T23346] ? shmem_alloc_inode+0x1c/0x50 [ 1191.409542][T23346] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1191.415786][T23346] kmem_cache_alloc+0x64e/0x710 [ 1191.420651][T23346] ? __alloc_fd+0x487/0x620 [ 1191.425208][T23346] ? shmem_destroy_inode+0x80/0x80 [ 1191.430330][T23346] shmem_alloc_inode+0x1c/0x50 [ 1191.435103][T23346] alloc_inode+0x68/0x1e0 [ 1191.439435][T23346] new_inode_pseudo+0x19/0xf0 [ 1191.444116][T23346] new_inode+0x1f/0x40 [ 1191.448192][T23346] shmem_get_inode+0x84/0x7e0 [ 1191.452887][T23346] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1191.458436][T23346] shmem_file_setup+0x66/0x90 [ 1191.463135][T23346] __x64_sys_memfd_create+0x2a2/0x470 [ 1191.468513][T23346] ? memfd_fcntl+0x18c0/0x18c0 [ 1191.473283][T23346] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1191.479354][T23346] ? trace_hardirqs_off_caller+0x65/0x230 [ 1191.485087][T23346] ? trace_hardirqs_on+0x67/0x240 [ 1191.490124][T23346] do_syscall_64+0xfa/0x760 [ 1191.494645][T23346] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1191.500536][T23346] RIP: 0033:0x459829 [ 1191.504434][T23346] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1191.524035][T23346] RSP: 002b:00007fcb3b193a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 07:31:44 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(0xffffffffffffffff, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) [ 1191.532627][T23346] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1191.541244][T23346] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1191.549219][T23346] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1191.557200][T23346] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcb3b1946d4 [ 1191.565178][T23346] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 [ 1191.575610][T23344] CPU: 1 PID: 23344 Comm: syz-executor.0 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1191.584736][T23344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1191.594872][T23344] Call Trace: [ 1191.598166][T23344] dump_stack+0x172/0x1f0 [ 1191.602515][T23344] should_fail.cold+0xa/0x15 [ 1191.607104][T23344] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1191.613165][T23344] ? fault_create_debugfs_attr+0x180/0x180 [ 1191.618966][T23344] ? page_to_nid.part.0+0x20/0x20 [ 1191.623989][T23344] ? ___might_sleep+0x163/0x280 [ 1191.628840][T23344] __should_failslab+0x121/0x190 [ 1191.633772][T23344] ? shmem_destroy_inode+0x80/0x80 [ 1191.638878][T23344] should_failslab+0x9/0x14 [ 1191.643381][T23344] kmem_cache_alloc+0x2aa/0x710 [ 1191.648233][T23344] ? __alloc_fd+0x487/0x620 [ 1191.652733][T23344] ? __kasan_check_read+0x11/0x20 [ 1191.657760][T23344] ? shmem_destroy_inode+0x80/0x80 [ 1191.662864][T23344] shmem_alloc_inode+0x1c/0x50 [ 1191.667640][T23344] alloc_inode+0x68/0x1e0 [ 1191.671960][T23344] new_inode_pseudo+0x19/0xf0 [ 1191.676631][T23344] new_inode+0x1f/0x40 [ 1191.680701][T23344] shmem_get_inode+0x84/0x7e0 [ 1191.685404][T23344] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1191.690948][T23344] shmem_file_setup+0x66/0x90 [ 1191.695635][T23344] __x64_sys_memfd_create+0x2a2/0x470 [ 1191.701003][T23344] ? memfd_fcntl+0x18c0/0x18c0 [ 1191.705764][T23344] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1191.711827][T23344] ? trace_hardirqs_off_caller+0x65/0x230 [ 1191.717558][T23344] ? trace_hardirqs_on+0x67/0x240 [ 1191.722592][T23344] do_syscall_64+0xfa/0x760 [ 1191.727090][T23344] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1191.732971][T23344] RIP: 0033:0x459829 [ 1191.736859][T23344] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1191.757482][T23344] RSP: 002b:00007fb6eb999a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1191.765888][T23344] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1191.773856][T23344] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1191.781823][T23344] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 07:31:44 executing program 0 (fault-call:1 fault-nth:2): r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1191.789788][T23344] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb6eb99a6d4 [ 1191.797755][T23344] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 [ 1191.808555][T23336] hfs: can't find a HFS filesystem on dev loop1 07:31:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:31:44 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0xe0000, 0x0) 07:31:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57b") [ 1191.862637][T23346] hfs: gid requires an argument [ 1191.873312][T23346] hfs: unable to parse mount options [ 1191.934987][T23352] FAULT_INJECTION: forcing a failure. [ 1191.934987][T23352] name failslab, interval 1, probability 0, space 0, times 0 [ 1191.970530][T23352] CPU: 0 PID: 23352 Comm: syz-executor.0 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1191.979666][T23352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1191.979672][T23352] Call Trace: [ 1191.979695][T23352] dump_stack+0x172/0x1f0 [ 1191.979731][T23352] should_fail.cold+0xa/0x15 [ 1191.993043][T23352] ? fault_create_debugfs_attr+0x180/0x180 [ 1191.993066][T23352] ? page_to_nid.part.0+0x20/0x20 [ 1192.001969][T23352] ? ___might_sleep+0x163/0x280 [ 1192.012757][T23352] __should_failslab+0x121/0x190 [ 1192.012774][T23352] should_failslab+0x9/0x14 [ 1192.012793][T23352] kmem_cache_alloc+0x2aa/0x710 [ 1192.022543][T23352] ? lock_acquire+0x190/0x410 [ 1192.022559][T23352] ? current_time+0x6b/0x140 [ 1192.022580][T23352] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1192.036556][T23352] ? timespec64_trunc+0xf0/0x180 [ 1192.048630][T23355] hfs: can't find a HFS filesystem on dev loop1 [ 1192.052270][T23352] __d_alloc+0x2e/0x8c0 [ 1192.052287][T23352] d_alloc_pseudo+0x1e/0x70 [ 1192.052303][T23352] alloc_file_pseudo+0xe2/0x280 [ 1192.052324][T23352] ? alloc_file+0x4d0/0x4d0 [ 1192.076512][T23352] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1192.082816][T23352] __shmem_file_setup.part.0+0x108/0x2b0 [ 1192.088459][T23352] shmem_file_setup+0x66/0x90 [ 1192.093146][T23352] __x64_sys_memfd_create+0x2a2/0x470 [ 1192.098520][T23352] ? memfd_fcntl+0x18c0/0x18c0 [ 1192.103292][T23352] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1192.109370][T23352] ? trace_hardirqs_off_caller+0x65/0x230 [ 1192.115100][T23352] ? trace_hardirqs_on+0x67/0x240 [ 1192.120127][T23352] do_syscall_64+0xfa/0x760 [ 1192.124643][T23352] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1192.130530][T23352] RIP: 0033:0x459829 [ 1192.134428][T23352] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1192.154040][T23352] RSP: 002b:00007fb6eb999a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1192.162455][T23352] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1192.170544][T23352] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 07:31:45 executing program 2 (fault-call:2 fault-nth:3): r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:31:45 executing program 0 (fault-call:1 fault-nth:3): r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1192.178513][T23352] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1192.186522][T23352] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb6eb99a6d4 [ 1192.194504][T23352] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:31:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57b") 07:31:45 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0xe0000, 0x0) [ 1192.326650][T23368] FAULT_INJECTION: forcing a failure. [ 1192.326650][T23368] name failslab, interval 1, probability 0, space 0, times 0 [ 1192.350287][T23370] FAULT_INJECTION: forcing a failure. [ 1192.350287][T23370] name failslab, interval 1, probability 0, space 0, times 0 [ 1192.351412][T23368] CPU: 1 PID: 23368 Comm: syz-executor.0 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1192.371987][T23368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1192.371991][T23368] Call Trace: [ 1192.372012][T23368] dump_stack+0x172/0x1f0 [ 1192.372031][T23368] should_fail.cold+0xa/0x15 [ 1192.372044][T23368] ? __kasan_check_read+0x11/0x20 [ 1192.372067][T23368] ? fault_create_debugfs_attr+0x180/0x180 [ 1192.394260][T23368] ? page_to_nid.part.0+0x20/0x20 [ 1192.394276][T23368] ? ___might_sleep+0x163/0x280 [ 1192.394293][T23368] __should_failslab+0x121/0x190 [ 1192.394308][T23368] should_failslab+0x9/0x14 [ 1192.394320][T23368] kmem_cache_alloc+0x2aa/0x710 [ 1192.394340][T23368] ? rwlock_bug.part.0+0x90/0x90 [ 1192.434113][T23368] ? __d_instantiate+0x82/0x470 [ 1192.438972][T23368] ? lock_downgrade+0x920/0x920 [ 1192.443825][T23368] __alloc_file+0x27/0x340 [ 1192.448253][T23368] alloc_empty_file+0x72/0x170 [ 1192.453018][T23368] alloc_file+0x5e/0x4d0 [ 1192.457271][T23368] alloc_file_pseudo+0x189/0x280 [ 1192.462221][T23368] ? alloc_file+0x4d0/0x4d0 [ 1192.466735][T23368] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 07:31:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0b") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) [ 1192.472984][T23368] __shmem_file_setup.part.0+0x108/0x2b0 [ 1192.478620][T23368] shmem_file_setup+0x66/0x90 [ 1192.483302][T23368] __x64_sys_memfd_create+0x2a2/0x470 [ 1192.488674][T23368] ? memfd_fcntl+0x18c0/0x18c0 [ 1192.493454][T23368] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1192.499534][T23368] ? trace_hardirqs_off_caller+0x65/0x230 [ 1192.499550][T23368] ? trace_hardirqs_on+0x67/0x240 [ 1192.499569][T23368] do_syscall_64+0xfa/0x760 [ 1192.499591][T23368] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1192.523688][T23368] RIP: 0033:0x459829 [ 1192.523706][T23368] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1192.523713][T23368] RSP: 002b:00007fb6eb999a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1192.523726][T23368] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1192.523733][T23368] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1192.523740][T23368] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1192.523747][T23368] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb6eb99a6d4 [ 1192.523754][T23368] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 [ 1192.540326][T23370] CPU: 1 PID: 23370 Comm: syz-executor.2 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1192.561801][T23370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1192.561806][T23370] Call Trace: [ 1192.561827][T23370] dump_stack+0x172/0x1f0 [ 1192.561846][T23370] should_fail.cold+0xa/0x15 [ 1192.561867][T23370] ? __kasan_check_read+0x11/0x20 [ 1192.577874][T23370] ? fault_create_debugfs_attr+0x180/0x180 [ 1192.577894][T23370] ? page_to_nid.part.0+0x20/0x20 [ 1192.577909][T23370] ? ___might_sleep+0x163/0x280 [ 1192.577930][T23370] __should_failslab+0x121/0x190 [ 1192.658836][T23370] should_failslab+0x9/0x14 [ 1192.663348][T23370] kmem_cache_alloc+0x2aa/0x710 [ 1192.668199][T23370] ? rwlock_bug.part.0+0x90/0x90 [ 1192.675665][T23370] ? __d_instantiate+0x82/0x470 [ 1192.680528][T23370] ? lock_downgrade+0x920/0x920 [ 1192.685382][T23370] __alloc_file+0x27/0x340 [ 1192.689802][T23370] alloc_empty_file+0x72/0x170 [ 1192.694569][T23370] alloc_file+0x5e/0x4d0 [ 1192.698815][T23370] alloc_file_pseudo+0x189/0x280 [ 1192.703768][T23370] ? alloc_file+0x4d0/0x4d0 [ 1192.708280][T23370] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1192.714528][T23370] __shmem_file_setup.part.0+0x108/0x2b0 [ 1192.720167][T23370] shmem_file_setup+0x66/0x90 [ 1192.724861][T23370] __x64_sys_memfd_create+0x2a2/0x470 [ 1192.730240][T23370] ? memfd_fcntl+0x18c0/0x18c0 [ 1192.735009][T23370] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1192.741082][T23370] ? trace_hardirqs_off_caller+0x65/0x230 [ 1192.746805][T23370] ? trace_hardirqs_on+0x67/0x240 [ 1192.751833][T23370] do_syscall_64+0xfa/0x760 [ 1192.756359][T23370] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1192.762253][T23370] RIP: 0033:0x459829 [ 1192.766151][T23370] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1192.785759][T23370] RSP: 002b:00007fcb3b193a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1192.794175][T23370] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1192.802149][T23370] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1192.810120][T23370] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1192.818094][T23370] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcb3b1946d4 07:31:45 executing program 0 (fault-call:1 fault-nth:4): r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1192.826069][T23370] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:31:45 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(0xffffffffffffffff, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:31:45 executing program 2 (fault-call:2 fault-nth:4): r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) [ 1192.910628][T23369] hfs: can't find a HFS filesystem on dev loop1 [ 1192.938105][T23383] FAULT_INJECTION: forcing a failure. [ 1192.938105][T23383] name failslab, interval 1, probability 0, space 0, times 0 [ 1192.957542][T23383] CPU: 0 PID: 23383 Comm: syz-executor.0 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1192.966663][T23383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1192.976723][T23383] Call Trace: [ 1192.976753][T23383] dump_stack+0x172/0x1f0 [ 1192.976776][T23383] should_fail.cold+0xa/0x15 [ 1192.976794][T23383] ? fault_create_debugfs_attr+0x180/0x180 [ 1192.976821][T23383] ? page_to_nid.part.0+0x20/0x20 [ 1192.999812][T23383] ? ___might_sleep+0x163/0x280 [ 1193.004673][T23383] __should_failslab+0x121/0x190 [ 1193.009616][T23383] should_failslab+0x9/0x14 [ 1193.014118][T23383] kmem_cache_alloc+0x2aa/0x710 [ 1193.018977][T23383] ? memcg_kmem_put_cache+0x3e/0x50 [ 1193.024194][T23383] ? kmem_cache_alloc+0x314/0x710 [ 1193.029229][T23383] security_file_alloc+0x39/0x170 [ 1193.034521][T23383] __alloc_file+0xde/0x340 [ 1193.038936][T23383] alloc_empty_file+0x72/0x170 [ 1193.043702][T23383] alloc_file+0x5e/0x4d0 [ 1193.047965][T23383] alloc_file_pseudo+0x189/0x280 [ 1193.052904][T23383] ? alloc_file+0x4d0/0x4d0 [ 1193.057415][T23383] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1193.063660][T23383] __shmem_file_setup.part.0+0x108/0x2b0 [ 1193.069297][T23383] shmem_file_setup+0x66/0x90 [ 1193.073975][T23383] __x64_sys_memfd_create+0x2a2/0x470 [ 1193.079356][T23383] ? memfd_fcntl+0x18c0/0x18c0 [ 1193.084125][T23383] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1193.090194][T23383] ? trace_hardirqs_off_caller+0x65/0x230 [ 1193.095917][T23383] ? trace_hardirqs_on+0x67/0x240 [ 1193.100943][T23383] do_syscall_64+0xfa/0x760 [ 1193.105454][T23383] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1193.111342][T23383] RIP: 0033:0x459829 [ 1193.115235][T23383] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1193.134841][T23383] RSP: 002b:00007fb6eb999a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1193.143259][T23383] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1193.151228][T23383] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 07:31:46 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0xe0000, 0x0) [ 1193.159198][T23383] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1193.167166][T23383] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb6eb99a6d4 [ 1193.175132][T23383] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:31:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0b") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) [ 1193.231603][T23386] FAULT_INJECTION: forcing a failure. [ 1193.231603][T23386] name failslab, interval 1, probability 0, space 0, times 0 [ 1193.256672][T23386] CPU: 0 PID: 23386 Comm: syz-executor.2 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1193.265805][T23386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1193.265812][T23386] Call Trace: [ 1193.265845][T23386] dump_stack+0x172/0x1f0 [ 1193.283474][T23386] should_fail.cold+0xa/0x15 [ 1193.283495][T23386] ? __kasan_check_read+0x11/0x20 [ 1193.293082][T23386] ? fault_create_debugfs_attr+0x180/0x180 [ 1193.298907][T23386] ? page_to_nid.part.0+0x20/0x20 [ 1193.303937][T23386] ? ___might_sleep+0x163/0x280 [ 1193.308802][T23386] __should_failslab+0x121/0x190 [ 1193.313753][T23386] should_failslab+0x9/0x14 [ 1193.318266][T23386] kmem_cache_alloc+0x2aa/0x710 [ 1193.323122][T23386] ? rwlock_bug.part.0+0x90/0x90 [ 1193.328075][T23386] ? __d_instantiate+0x82/0x470 [ 1193.332933][T23386] ? lock_downgrade+0x920/0x920 [ 1193.337786][T23386] __alloc_file+0x27/0x340 [ 1193.342204][T23386] alloc_empty_file+0x72/0x170 [ 1193.346969][T23386] alloc_file+0x5e/0x4d0 [ 1193.351215][T23386] alloc_file_pseudo+0x189/0x280 [ 1193.356153][T23386] ? alloc_file+0x4d0/0x4d0 [ 1193.360659][T23386] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1193.366904][T23386] __shmem_file_setup.part.0+0x108/0x2b0 [ 1193.372542][T23386] shmem_file_setup+0x66/0x90 [ 1193.377222][T23386] __x64_sys_memfd_create+0x2a2/0x470 [ 1193.382593][T23386] ? memfd_fcntl+0x18c0/0x18c0 [ 1193.387358][T23386] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1193.393602][T23386] ? trace_hardirqs_off_caller+0x65/0x230 [ 1193.399319][T23386] ? trace_hardirqs_on+0x67/0x240 [ 1193.404350][T23386] do_syscall_64+0xfa/0x760 [ 1193.408858][T23386] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1193.414749][T23386] RIP: 0033:0x459829 [ 1193.418649][T23386] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1193.438255][T23386] RSP: 002b:00007fcb3b193a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1193.446673][T23386] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1193.454649][T23386] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1193.462624][T23386] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1193.470599][T23386] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcb3b1946d4 07:31:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57b") [ 1193.478574][T23386] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:31:46 executing program 0 (fault-call:1 fault-nth:5): r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:46 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0xe0000, 0x0) 07:31:46 executing program 2 (fault-call:2 fault-nth:5): r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) [ 1193.578896][T23395] FAULT_INJECTION: forcing a failure. [ 1193.578896][T23395] name failslab, interval 1, probability 0, space 0, times 0 [ 1193.600273][T23395] CPU: 0 PID: 23395 Comm: syz-executor.0 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1193.609399][T23395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1193.619454][T23395] Call Trace: [ 1193.622820][T23395] dump_stack+0x172/0x1f0 [ 1193.627171][T23395] should_fail.cold+0xa/0x15 [ 1193.631774][T23395] ? fault_create_debugfs_attr+0x180/0x180 [ 1193.637586][T23395] ? unwind_get_return_address+0x61/0xa0 [ 1193.643222][T23395] ? profile_setup.cold+0xbb/0xbb [ 1193.648250][T23395] ? ___might_sleep+0x163/0x280 [ 1193.653110][T23395] __should_failslab+0x121/0x190 [ 1193.658970][T23395] should_failslab+0x9/0x14 [ 1193.663473][T23395] __kmalloc+0x2e0/0x770 [ 1193.667717][T23395] ? mark_held_locks+0xf0/0xf0 [ 1193.672488][T23395] ? stack_trace_save+0xac/0xe0 [ 1193.677344][T23395] ? stack_trace_consume_entry+0x190/0x190 [ 1193.683151][T23395] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 1193.688967][T23395] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1193.694690][T23395] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1193.700240][T23395] ? tomoyo_path_perm+0x1cb/0x430 [ 1193.705270][T23395] tomoyo_path_perm+0x230/0x430 [ 1193.710118][T23395] ? tomoyo_path_perm+0x1cb/0x430 [ 1193.715145][T23395] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 1193.721209][T23395] ? __fget+0x35d/0x560 [ 1193.725364][T23395] ? __kasan_check_read+0x11/0x20 [ 1193.730387][T23395] ? __kasan_check_read+0x11/0x20 [ 1193.735505][T23395] ? __fget+0xa3/0x560 [ 1193.739591][T23395] ? lock_acquire+0x190/0x410 [ 1193.744275][T23395] ? do_sys_ftruncate+0x282/0x550 [ 1193.749300][T23395] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1193.755561][T23395] tomoyo_path_truncate+0x1d/0x30 [ 1193.760593][T23395] security_path_truncate+0xf2/0x150 [ 1193.765885][T23395] do_sys_ftruncate+0x3d9/0x550 [ 1193.770750][T23395] __x64_sys_ftruncate+0x59/0x80 [ 1193.775707][T23395] do_syscall_64+0xfa/0x760 [ 1193.780226][T23395] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1193.786114][T23395] RIP: 0033:0x4597f7 [ 1193.790009][T23395] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1193.809704][T23395] RSP: 002b:00007fb6eb999a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 1193.818130][T23395] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597f7 07:31:46 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(0xffffffffffffffff, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) [ 1193.826104][T23395] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000005 [ 1193.834079][T23395] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1193.842056][T23395] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000005 [ 1193.850031][T23395] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 [ 1193.866825][T23395] ERROR: Out of memory at tomoyo_realpath_from_path. 07:31:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0b") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) [ 1193.904957][T23397] hfs: can't find a HFS filesystem on dev loop1 [ 1193.906539][T23404] FAULT_INJECTION: forcing a failure. [ 1193.906539][T23404] name failslab, interval 1, probability 0, space 0, times 0 [ 1193.930944][T23395] hfs: can't find a HFS filesystem on dev loop0 [ 1193.972402][T23404] CPU: 0 PID: 23404 Comm: syz-executor.2 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1193.981541][T23404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1193.991600][T23404] Call Trace: [ 1193.994910][T23404] dump_stack+0x172/0x1f0 [ 1193.999245][T23404] should_fail.cold+0xa/0x15 [ 1194.003846][T23404] ? fault_create_debugfs_attr+0x180/0x180 [ 1194.009657][T23404] ? unwind_get_return_address+0x61/0xa0 [ 1194.015287][T23404] ? profile_setup.cold+0xbb/0xbb [ 1194.020322][T23404] ? ___might_sleep+0x163/0x280 [ 1194.025179][T23404] __should_failslab+0x121/0x190 [ 1194.030122][T23404] should_failslab+0x9/0x14 [ 1194.034639][T23404] __kmalloc+0x2e0/0x770 [ 1194.038892][T23404] ? mark_held_locks+0xf0/0xf0 [ 1194.043660][T23404] ? stack_trace_save+0xac/0xe0 [ 1194.048516][T23404] ? stack_trace_consume_entry+0x190/0x190 [ 1194.054326][T23404] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 1194.060133][T23404] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1194.065858][T23404] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1194.071404][T23404] ? tomoyo_path_perm+0x1cb/0x430 [ 1194.076432][T23404] tomoyo_path_perm+0x230/0x430 [ 1194.081285][T23404] ? tomoyo_path_perm+0x1cb/0x430 [ 1194.086313][T23404] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 1194.092383][T23404] ? __fget+0x35d/0x560 [ 1194.096542][T23404] ? __kasan_check_read+0x11/0x20 [ 1194.101574][T23404] ? __kasan_check_read+0x11/0x20 [ 1194.106603][T23404] ? __fget+0xa3/0x560 [ 1194.110683][T23404] ? lock_acquire+0x190/0x410 [ 1194.115360][T23404] ? do_sys_ftruncate+0x282/0x550 [ 1194.120390][T23404] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1194.126636][T23404] tomoyo_path_truncate+0x1d/0x30 [ 1194.131670][T23404] security_path_truncate+0xf2/0x150 [ 1194.136968][T23404] do_sys_ftruncate+0x3d9/0x550 [ 1194.141826][T23404] __x64_sys_ftruncate+0x59/0x80 [ 1194.146776][T23404] do_syscall_64+0xfa/0x760 [ 1194.151378][T23404] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1194.157267][T23404] RIP: 0033:0x4597f7 [ 1194.161168][T23404] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1194.180779][T23404] RSP: 002b:00007fcb3b193a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 1194.189197][T23404] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597f7 [ 1194.197177][T23404] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000005 [ 1194.205149][T23404] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1194.213124][T23404] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000005 [ 1194.221097][T23404] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 [ 1194.229963][T23404] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1194.334963][T23404] hfs: gid requires an argument 07:31:47 executing program 0 (fault-call:1 fault-nth:6): r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:47 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0xe0000, 0x0) 07:31:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf0") [ 1194.358727][T23404] hfs: unable to parse mount options 07:31:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57b") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:31:47 executing program 2 (fault-call:2 fault-nth:6): r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) [ 1194.481611][T23417] FAULT_INJECTION: forcing a failure. [ 1194.481611][T23417] name failslab, interval 1, probability 0, space 0, times 0 [ 1194.500033][T23419] FAULT_INJECTION: forcing a failure. [ 1194.500033][T23419] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1194.515260][T23417] CPU: 0 PID: 23417 Comm: syz-executor.0 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1194.526872][T23417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1194.536924][T23417] Call Trace: [ 1194.540675][T23417] dump_stack+0x172/0x1f0 [ 1194.545006][T23417] should_fail.cold+0xa/0x15 [ 1194.549593][T23417] ? bpf_prog_kallsyms_find+0x50/0x2c0 [ 1194.555051][T23417] ? fault_create_debugfs_attr+0x180/0x180 [ 1194.560853][T23417] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1194.567089][T23417] ? should_fail+0x1de/0x852 [ 1194.571766][T23417] ? ___might_sleep+0x163/0x280 [ 1194.576635][T23417] __should_failslab+0x121/0x190 [ 1194.581570][T23417] should_failslab+0x9/0x14 [ 1194.586070][T23417] __kmalloc+0x2e0/0x770 [ 1194.590305][T23417] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1194.596639][T23417] ? simple_dname+0xd1/0x1f0 [ 1194.601225][T23417] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1194.606593][T23417] tomoyo_encode2.part.0+0xf5/0x400 [ 1194.611815][T23417] ? stack_trace_consume_entry+0x190/0x190 [ 1194.617829][T23417] tomoyo_encode+0x2b/0x50 [ 1194.622244][T23417] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 1194.627875][T23417] ? tomoyo_path_perm+0x1cb/0x430 [ 1194.632899][T23417] tomoyo_path_perm+0x230/0x430 [ 1194.637750][T23417] ? tomoyo_path_perm+0x1cb/0x430 [ 1194.642768][T23417] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 1194.648836][T23417] ? __fget+0x35d/0x560 [ 1194.652991][T23417] ? __kasan_check_read+0x11/0x20 [ 1194.658012][T23417] ? __kasan_check_read+0x11/0x20 [ 1194.663033][T23417] ? __fget+0xa3/0x560 [ 1194.667106][T23417] ? lock_acquire+0x190/0x410 [ 1194.673285][T23417] ? do_sys_ftruncate+0x282/0x550 [ 1194.678309][T23417] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1194.684547][T23417] tomoyo_path_truncate+0x1d/0x30 [ 1194.689657][T23417] security_path_truncate+0xf2/0x150 [ 1194.694939][T23417] do_sys_ftruncate+0x3d9/0x550 [ 1194.699818][T23417] __x64_sys_ftruncate+0x59/0x80 [ 1194.704852][T23417] do_syscall_64+0xfa/0x760 [ 1194.709355][T23417] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1194.715236][T23417] RIP: 0033:0x4597f7 [ 1194.719124][T23417] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1194.738723][T23417] RSP: 002b:00007fb6eb999a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 1194.747138][T23417] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597f7 [ 1194.755104][T23417] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000005 [ 1194.763070][T23417] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1194.771032][T23417] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000005 [ 1194.779003][T23417] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 [ 1194.786991][T23419] CPU: 1 PID: 23419 Comm: syz-executor.2 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1194.796108][T23419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1194.806161][T23419] Call Trace: [ 1194.806183][T23419] dump_stack+0x172/0x1f0 [ 1194.806202][T23419] should_fail.cold+0xa/0x15 [ 1194.806217][T23419] ? fault_create_debugfs_attr+0x180/0x180 [ 1194.806236][T23419] ? is_bpf_text_address+0xac/0x170 [ 1194.806250][T23419] ? __kasan_check_read+0x11/0x20 [ 1194.806273][T23419] should_fail_alloc_page+0x50/0x60 [ 1194.810067][T23417] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1194.813856][T23419] __alloc_pages_nodemask+0x1a1/0x900 [ 1194.813869][T23419] ? __bpf_address_lookup+0x310/0x310 [ 1194.813884][T23419] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1194.813897][T23419] ? __alloc_pages_slowpath+0x2530/0x2530 [ 1194.813915][T23419] ? kernel_text_address+0x73/0xf0 [ 1194.813930][T23419] ? fault_create_debugfs_attr+0x180/0x180 [ 1194.813945][T23419] cache_grow_begin+0x90/0xd20 [ 1194.813960][T23419] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1194.813974][T23419] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1194.813992][T23419] __kmalloc+0x6b2/0x770 [ 1194.840074][T23419] ? mark_held_locks+0xf0/0xf0 [ 1194.840092][T23419] ? stack_trace_save+0xac/0xe0 [ 1194.840109][T23419] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1194.840129][T23419] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1194.852154][T23419] ? tomoyo_path_perm+0x1cb/0x430 [ 1194.852172][T23419] tomoyo_path_perm+0x230/0x430 [ 1194.852183][T23419] ? tomoyo_path_perm+0x1cb/0x430 [ 1194.852197][T23419] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 1194.852210][T23419] ? __fget+0x35d/0x560 [ 1194.852223][T23419] ? __kasan_check_read+0x11/0x20 [ 1194.852241][T23419] ? __kasan_check_read+0x11/0x20 [ 1194.852257][T23419] ? __fget+0xa3/0x560 [ 1194.852279][T23419] ? lock_acquire+0x190/0x410 [ 1194.852294][T23419] ? do_sys_ftruncate+0x282/0x550 [ 1194.852317][T23419] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1194.976949][T23419] tomoyo_path_truncate+0x1d/0x30 [ 1194.981981][T23419] security_path_truncate+0xf2/0x150 [ 1194.987269][T23419] do_sys_ftruncate+0x3d9/0x550 [ 1194.987289][T23419] __x64_sys_ftruncate+0x59/0x80 [ 1194.987306][T23419] do_syscall_64+0xfa/0x760 [ 1194.987330][T23419] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1195.007433][T23419] RIP: 0033:0x4597f7 [ 1195.007450][T23419] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:31:47 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) [ 1195.007464][T23419] RSP: 002b:00007fcb3b193a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 1195.039325][T23419] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597f7 [ 1195.039333][T23419] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000005 [ 1195.039341][T23419] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1195.039348][T23419] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000005 [ 1195.039356][T23419] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 [ 1195.133917][T23416] hfs: can't find a HFS filesystem on dev loop1 [ 1195.174695][T23417] hfs: can't find a HFS filesystem on dev loop0 [ 1195.192901][T23419] hfs: gid requires an argument 07:31:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57b") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:31:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0xe0000, 0x0) [ 1195.219221][T23419] hfs: unable to parse mount options 07:31:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf0") 07:31:48 executing program 0 (fault-call:1 fault-nth:7): r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0xe0000, 0x0) [ 1195.402994][T23441] FAULT_INJECTION: forcing a failure. [ 1195.402994][T23441] name failslab, interval 1, probability 0, space 0, times 0 [ 1195.426983][T23441] CPU: 0 PID: 23441 Comm: syz-executor.0 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1195.436122][T23441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1195.436128][T23441] Call Trace: [ 1195.436152][T23441] dump_stack+0x172/0x1f0 [ 1195.436181][T23441] should_fail.cold+0xa/0x15 [ 1195.458393][T23441] ? __kasan_check_read+0x11/0x20 [ 1195.463507][T23441] ? fault_create_debugfs_attr+0x180/0x180 [ 1195.463522][T23441] ? __kasan_check_write+0x14/0x20 [ 1195.463543][T23441] ? lock_downgrade+0x920/0x920 [ 1195.479263][T23441] ? ___might_sleep+0x163/0x280 [ 1195.484124][T23441] __should_failslab+0x121/0x190 [ 1195.489065][T23441] should_failslab+0x9/0x14 [ 1195.493586][T23441] __kmalloc+0x2e0/0x770 [ 1195.497832][T23441] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1195.504072][T23441] ? simple_dname+0xd1/0x1f0 [ 1195.508670][T23441] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1195.514072][T23441] tomoyo_encode2.part.0+0xf5/0x400 [ 1195.519281][T23441] tomoyo_encode+0x2b/0x50 [ 1195.523726][T23441] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 1195.529387][T23441] ? tomoyo_path_perm+0x1cb/0x430 [ 1195.534413][T23441] tomoyo_path_perm+0x230/0x430 [ 1195.540568][T23441] ? tomoyo_path_perm+0x1cb/0x430 [ 1195.545613][T23441] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 1195.551686][T23441] ? __fget+0x35d/0x560 [ 1195.555843][T23441] ? __kasan_check_read+0x11/0x20 [ 1195.560880][T23441] ? __kasan_check_read+0x11/0x20 [ 1195.565906][T23441] ? __fget+0xa3/0x560 [ 1195.569991][T23441] ? lock_acquire+0x190/0x410 [ 1195.574669][T23441] ? do_sys_ftruncate+0x282/0x550 [ 1195.579716][T23441] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1195.585961][T23441] tomoyo_path_truncate+0x1d/0x30 [ 1195.590985][T23441] security_path_truncate+0xf2/0x150 [ 1195.596272][T23441] do_sys_ftruncate+0x3d9/0x550 [ 1195.601127][T23441] __x64_sys_ftruncate+0x59/0x80 [ 1195.606070][T23441] do_syscall_64+0xfa/0x760 [ 1195.610580][T23441] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1195.616465][T23441] RIP: 0033:0x4597f7 [ 1195.620364][T23441] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1195.640056][T23441] RSP: 002b:00007fb6eb999a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 1195.648499][T23441] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597f7 [ 1195.656481][T23441] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000005 [ 1195.664478][T23441] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1195.672452][T23441] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000005 [ 1195.680423][T23441] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 [ 1195.693125][T23441] ERROR: Out of memory at tomoyo_realpath_from_path. 07:31:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57b") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) [ 1195.707263][T23437] hfs: can't find a HFS filesystem on dev loop1 07:31:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:31:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf0") [ 1195.820639][T23441] hfs: can't find a HFS filesystem on dev loop0 07:31:48 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) [ 1196.029300][T23452] hfs: gid requires an argument [ 1196.044637][T23452] hfs: unable to parse mount options 07:31:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0xe0000, 0x0) 07:31:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf0") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:31:49 executing program 0 (fault-call:1 fault-nth:8): r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='\nfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) [ 1196.108838][T23454] hfs: can't find a HFS filesystem on dev loop1 [ 1196.204058][T23466] FAULT_INJECTION: forcing a failure. [ 1196.204058][T23466] name failslab, interval 1, probability 0, space 0, times 0 [ 1196.254897][T23466] CPU: 1 PID: 23466 Comm: syz-executor.0 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1196.264068][T23466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1196.274216][T23466] Call Trace: [ 1196.277523][T23466] dump_stack+0x172/0x1f0 [ 1196.281867][T23466] should_fail.cold+0xa/0x15 [ 1196.286464][T23466] ? fault_create_debugfs_attr+0x180/0x180 [ 1196.292280][T23466] ? page_to_nid.part.0+0x20/0x20 [ 1196.297311][T23466] ? ___might_sleep+0x163/0x280 [ 1196.302181][T23466] __should_failslab+0x121/0x190 [ 1196.307131][T23466] should_failslab+0x9/0x14 [ 1196.311639][T23466] kmem_cache_alloc+0x2aa/0x710 [ 1196.316499][T23466] ? __kasan_check_write+0x14/0x20 [ 1196.321696][T23466] ? up_write+0x155/0x490 [ 1196.326118][T23466] getname_flags+0xd6/0x5b0 [ 1196.330628][T23466] getname+0x1a/0x20 [ 1196.334879][T23466] do_sys_open+0x2c9/0x5d0 [ 1196.339295][T23466] ? filp_open+0x80/0x80 [ 1196.343548][T23466] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1196.349791][T23466] ? fput+0x1b/0x20 07:31:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0xe0000, 0x0) 07:31:49 executing program 1 (fault-call:1 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1196.353602][T23466] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1196.359670][T23466] __x64_sys_open+0x7e/0xc0 [ 1196.364182][T23466] do_syscall_64+0xfa/0x760 [ 1196.368691][T23466] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1196.374840][T23466] RIP: 0033:0x413711 [ 1196.378736][T23466] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1196.398345][T23466] RSP: 002b:00007fb6eb999a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1196.406759][T23466] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 1196.414732][T23466] RDX: 00007fb6eb999b0a RSI: 0000000000000002 RDI: 00007fb6eb999b00 [ 1196.422702][T23466] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1196.430671][T23466] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 1196.438638][T23466] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:31:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf0") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) [ 1196.479394][T23473] FAULT_INJECTION: forcing a failure. [ 1196.479394][T23473] name failslab, interval 1, probability 0, space 0, times 0 [ 1196.522353][T23473] CPU: 1 PID: 23473 Comm: syz-executor.1 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1196.531513][T23473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1196.541569][T23473] Call Trace: [ 1196.544875][T23473] dump_stack+0x172/0x1f0 [ 1196.549219][T23473] should_fail.cold+0xa/0x15 [ 1196.553831][T23473] ? fault_create_debugfs_attr+0x180/0x180 [ 1196.559733][T23473] ? page_to_nid.part.0+0x20/0x20 [ 1196.564759][T23473] ? ___might_sleep+0x163/0x280 [ 1196.569618][T23473] __should_failslab+0x121/0x190 [ 1196.575427][T23473] should_failslab+0x9/0x14 [ 1196.579938][T23473] __kmalloc+0x2e0/0x770 [ 1196.584184][T23473] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1196.590426][T23473] ? fput_many+0x12c/0x1a0 [ 1196.594846][T23473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1196.601089][T23473] ? strnlen_user+0x1ed/0x2e0 [ 1196.605772][T23473] ? __x64_sys_memfd_create+0x13c/0x470 [ 1196.611321][T23473] __x64_sys_memfd_create+0x13c/0x470 [ 1196.616698][T23473] ? memfd_fcntl+0x18c0/0x18c0 [ 1196.621466][T23473] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1196.627535][T23473] ? trace_hardirqs_off_caller+0x65/0x230 [ 1196.633266][T23473] ? trace_hardirqs_on+0x67/0x240 [ 1196.638299][T23473] do_syscall_64+0xfa/0x760 [ 1196.642905][T23473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1196.648795][T23473] RIP: 0033:0x459829 07:31:49 executing program 0 (fault-call:1 fault-nth:9): r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1196.652695][T23473] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1196.674076][T23473] RSP: 002b:00007ff939d98a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1196.682492][T23473] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1196.690462][T23473] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1196.698433][T23473] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1196.706409][T23473] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff939d996d4 [ 1196.714385][T23473] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:31:49 executing program 1 (fault-call:1 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1196.788457][T23484] FAULT_INJECTION: forcing a failure. [ 1196.788457][T23484] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1196.801683][T23484] CPU: 1 PID: 23484 Comm: syz-executor.0 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1196.801694][T23484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1196.801708][T23484] Call Trace: [ 1196.820891][T23484] dump_stack+0x172/0x1f0 [ 1196.820911][T23484] should_fail.cold+0xa/0x15 [ 1196.820933][T23484] ? fault_create_debugfs_attr+0x180/0x180 [ 1196.838874][T23484] ? rwlock_bug.part.0+0x90/0x90 [ 1196.843819][T23484] ? current_time+0x6b/0x140 [ 1196.848410][T23484] should_fail_alloc_page+0x50/0x60 [ 1196.853607][T23484] __alloc_pages_nodemask+0x1a1/0x900 [ 1196.858978][T23484] ? __kasan_check_read+0x11/0x20 [ 1196.864003][T23484] ? __alloc_pages_slowpath+0x2530/0x2530 [ 1196.869726][T23484] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1196.875357][T23484] ? __kasan_check_read+0x11/0x20 [ 1196.880391][T23484] ? fault_create_debugfs_attr+0x180/0x180 [ 1196.886201][T23484] cache_grow_begin+0x90/0xd20 [ 1196.890974][T23484] ? getname_flags+0xd6/0x5b0 [ 1196.895657][T23484] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1196.901902][T23484] kmem_cache_alloc+0x64e/0x710 [ 1196.906759][T23484] ? __kasan_check_write+0x14/0x20 [ 1196.911876][T23484] getname_flags+0xd6/0x5b0 [ 1196.916475][T23484] getname+0x1a/0x20 [ 1196.920373][T23484] do_sys_open+0x2c9/0x5d0 [ 1196.924795][T23484] ? filp_open+0x80/0x80 [ 1196.929044][T23484] ? switch_fpu_return+0x1fa/0x4f0 [ 1196.934164][T23484] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1196.940243][T23484] __x64_sys_open+0x7e/0xc0 [ 1196.944752][T23484] do_syscall_64+0xfa/0x760 [ 1196.949283][T23484] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1196.955178][T23484] RIP: 0033:0x413711 [ 1196.959074][T23484] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1196.978679][T23484] RSP: 002b:00007fb6eb999a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 07:31:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='%fs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) [ 1196.987098][T23484] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 1196.995067][T23484] RDX: 00007fb6eb999b0a RSI: 0000000000000002 RDI: 00007fb6eb999b00 [ 1197.003034][T23484] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1197.011001][T23484] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 1197.018979][T23484] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:31:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0xe0000, 0x0) 07:31:50 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) [ 1197.075825][T23487] FAULT_INJECTION: forcing a failure. [ 1197.075825][T23487] name failslab, interval 1, probability 0, space 0, times 0 [ 1197.102065][T23487] CPU: 1 PID: 23487 Comm: syz-executor.1 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1197.111195][T23487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1197.121252][T23487] Call Trace: [ 1197.124546][T23487] dump_stack+0x172/0x1f0 [ 1197.128881][T23487] should_fail.cold+0xa/0x15 [ 1197.133475][T23487] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1197.139538][T23487] ? fault_create_debugfs_attr+0x180/0x180 [ 1197.145343][T23487] ? page_to_nid.part.0+0x20/0x20 [ 1197.150362][T23487] ? ___might_sleep+0x163/0x280 [ 1197.155212][T23487] __should_failslab+0x121/0x190 [ 1197.160147][T23487] ? shmem_destroy_inode+0x80/0x80 [ 1197.165255][T23487] should_failslab+0x9/0x14 [ 1197.169752][T23487] kmem_cache_alloc+0x2aa/0x710 [ 1197.174629][T23487] ? __alloc_fd+0x487/0x620 [ 1197.179123][T23487] ? __kasan_check_read+0x11/0x20 [ 1197.184140][T23487] ? shmem_destroy_inode+0x80/0x80 [ 1197.189247][T23487] shmem_alloc_inode+0x1c/0x50 [ 1197.194001][T23487] alloc_inode+0x68/0x1e0 [ 1197.198362][T23487] new_inode_pseudo+0x19/0xf0 [ 1197.203033][T23487] new_inode+0x1f/0x40 [ 1197.207090][T23487] shmem_get_inode+0x84/0x7e0 [ 1197.211765][T23487] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1197.217306][T23487] shmem_file_setup+0x66/0x90 [ 1197.221977][T23487] __x64_sys_memfd_create+0x2a2/0x470 [ 1197.227346][T23487] ? memfd_fcntl+0x18c0/0x18c0 [ 1197.232104][T23487] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1197.238163][T23487] ? trace_hardirqs_off_caller+0x65/0x230 [ 1197.243874][T23487] ? trace_hardirqs_on+0x67/0x240 [ 1197.248914][T23487] do_syscall_64+0xfa/0x760 [ 1197.253437][T23487] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1197.259321][T23487] RIP: 0033:0x459829 [ 1197.263210][T23487] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1197.282824][T23487] RSP: 002b:00007ff939d98a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1197.291240][T23487] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1197.299207][T23487] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1197.307192][T23487] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1197.315157][T23487] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff939d996d4 [ 1197.323134][T23487] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:31:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf0") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:31:50 executing program 1 (fault-call:1 fault-nth:2): r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1197.395147][T23484] hfs: can't find a HFS filesystem on dev loop0 07:31:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='\\fs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:31:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0xe0000, 0x0) 07:31:50 executing program 0 (fault-call:1 fault-nth:10): r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) [ 1197.617418][T23506] FAULT_INJECTION: forcing a failure. [ 1197.617418][T23506] name failslab, interval 1, probability 0, space 0, times 0 [ 1197.653330][T23506] CPU: 0 PID: 23506 Comm: syz-executor.1 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1197.662486][T23506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1197.672545][T23506] Call Trace: [ 1197.675854][T23506] dump_stack+0x172/0x1f0 [ 1197.680195][T23506] should_fail.cold+0xa/0x15 [ 1197.684791][T23506] ? fault_create_debugfs_attr+0x180/0x180 [ 1197.690603][T23506] ? page_to_nid.part.0+0x20/0x20 [ 1197.695631][T23506] ? ___might_sleep+0x163/0x280 [ 1197.700482][T23506] __should_failslab+0x121/0x190 [ 1197.705420][T23506] should_failslab+0x9/0x14 [ 1197.709922][T23506] kmem_cache_alloc+0x2aa/0x710 [ 1197.714772][T23506] ? lock_acquire+0x190/0x410 [ 1197.719448][T23506] ? current_time+0x6b/0x140 [ 1197.724039][T23506] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1197.730282][T23506] ? timespec64_trunc+0xf0/0x180 [ 1197.735221][T23506] __d_alloc+0x2e/0x8c0 [ 1197.739381][T23506] d_alloc_pseudo+0x1e/0x70 [ 1197.743889][T23506] alloc_file_pseudo+0xe2/0x280 [ 1197.748746][T23506] ? alloc_file+0x4d0/0x4d0 [ 1197.753253][T23506] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1197.759501][T23506] __shmem_file_setup.part.0+0x108/0x2b0 [ 1197.765165][T23506] shmem_file_setup+0x66/0x90 [ 1197.769854][T23506] __x64_sys_memfd_create+0x2a2/0x470 [ 1197.775235][T23506] ? memfd_fcntl+0x18c0/0x18c0 [ 1197.780005][T23506] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1197.786075][T23506] ? trace_hardirqs_off_caller+0x65/0x230 [ 1197.791800][T23506] ? trace_hardirqs_on+0x67/0x240 [ 1197.796831][T23506] do_syscall_64+0xfa/0x760 [ 1197.801343][T23506] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1197.807232][T23506] RIP: 0033:0x459829 [ 1197.811130][T23506] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1197.830825][T23506] RSP: 002b:00007ff939d98a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1197.839247][T23506] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1197.847229][T23506] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1197.855217][T23506] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1197.863204][T23506] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff939d996d4 [ 1197.871178][T23506] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 [ 1197.906502][T23515] FAULT_INJECTION: forcing a failure. 07:31:50 executing program 1 (fault-call:1 fault-nth:3): r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1197.906502][T23515] name failslab, interval 1, probability 0, space 0, times 0 [ 1197.926079][T23515] CPU: 1 PID: 23515 Comm: syz-executor.0 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1197.935217][T23515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1197.945285][T23515] Call Trace: [ 1197.948593][T23515] dump_stack+0x172/0x1f0 [ 1197.952935][T23515] should_fail.cold+0xa/0x15 [ 1197.957533][T23515] ? is_bpf_text_address+0xd3/0x170 [ 1197.962737][T23515] ? fault_create_debugfs_attr+0x180/0x180 [ 1197.968554][T23515] ? page_to_nid.part.0+0x20/0x20 [ 1197.973587][T23515] ? ___might_sleep+0x163/0x280 [ 1197.978449][T23515] __should_failslab+0x121/0x190 [ 1197.983391][T23515] should_failslab+0x9/0x14 [ 1197.987894][T23515] kmem_cache_alloc+0x2aa/0x710 [ 1197.992748][T23515] ? stack_trace_save+0xac/0xe0 [ 1197.997609][T23515] ? stack_trace_consume_entry+0x190/0x190 [ 1198.004200][T23515] __alloc_file+0x27/0x340 [ 1198.008626][T23515] alloc_empty_file+0x72/0x170 [ 1198.013400][T23515] path_openat+0xef/0x4630 [ 1198.017819][T23515] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1198.023627][T23515] ? kasan_slab_alloc+0xf/0x20 [ 1198.028475][T23515] ? kmem_cache_alloc+0x121/0x710 [ 1198.033499][T23515] ? getname_flags+0xd6/0x5b0 [ 1198.038172][T23515] ? getname+0x1a/0x20 [ 1198.042248][T23515] ? do_sys_open+0x2c9/0x5d0 [ 1198.046832][T23515] ? __x64_sys_open+0x7e/0xc0 [ 1198.051511][T23515] ? do_syscall_64+0xfa/0x760 [ 1198.056195][T23515] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1198.062275][T23515] ? __isolate_free_page+0x4c0/0x4c0 07:31:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='h\ns\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) [ 1198.067590][T23515] ? __kasan_check_read+0x11/0x20 [ 1198.072619][T23515] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1198.077996][T23515] ? __kasan_check_read+0x11/0x20 [ 1198.083018][T23515] ? __alloc_pages_nodemask+0x578/0x900 [ 1198.088743][T23515] ? cache_grow_end+0xa4/0x190 [ 1198.093539][T23515] ? __kasan_check_read+0x11/0x20 [ 1198.098570][T23515] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1198.104301][T23515] do_filp_open+0x1a1/0x280 [ 1198.108809][T23515] ? may_open_dev+0x100/0x100 [ 1198.113489][T23515] ? lock_downgrade+0x920/0x920 [ 1198.118338][T23515] ? rwlock_bug.part.0+0x90/0x90 [ 1198.123277][T23515] ? __alloc_fd+0x35/0x620 [ 1198.127706][T23515] ? __kasan_check_read+0x11/0x20 [ 1198.132732][T23515] ? do_raw_spin_unlock+0x57/0x270 [ 1198.137847][T23515] ? _raw_spin_unlock+0x2d/0x50 [ 1198.142699][T23515] ? __alloc_fd+0x487/0x620 [ 1198.147210][T23515] do_sys_open+0x3fe/0x5d0 [ 1198.151633][T23515] ? filp_open+0x80/0x80 [ 1198.155880][T23515] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1198.162122][T23515] ? fput+0x1b/0x20 [ 1198.165935][T23515] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1198.171999][T23515] __x64_sys_open+0x7e/0xc0 [ 1198.176511][T23515] do_syscall_64+0xfa/0x760 [ 1198.181017][T23515] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1198.186907][T23515] RIP: 0033:0x413711 [ 1198.190803][T23515] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1198.210406][T23515] RSP: 002b:00007fb6eb999a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 07:31:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 07:31:51 executing program 0 (fault-call:1 fault-nth:11): r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1198.218824][T23515] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 1198.226796][T23515] RDX: 00007fb6eb999b0a RSI: 0000000000000002 RDI: 00007fb6eb999b00 [ 1198.234768][T23515] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1198.242736][T23515] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 1198.250704][T23515] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:31:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0xe0000, 0x0) 07:31:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x42440000, 0x0) [ 1198.326696][T23526] FAULT_INJECTION: forcing a failure. [ 1198.326696][T23526] name failslab, interval 1, probability 0, space 0, times 0 [ 1198.380321][T23531] FAULT_INJECTION: forcing a failure. [ 1198.380321][T23531] name failslab, interval 1, probability 0, space 0, times 0 [ 1198.395141][T23526] CPU: 0 PID: 23526 Comm: syz-executor.1 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1198.404264][T23526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1198.414320][T23526] Call Trace: [ 1198.417615][T23526] dump_stack+0x172/0x1f0 [ 1198.421954][T23526] should_fail.cold+0xa/0x15 [ 1198.426555][T23526] ? __kasan_check_read+0x11/0x20 [ 1198.431581][T23526] ? fault_create_debugfs_attr+0x180/0x180 [ 1198.437388][T23526] ? page_to_nid.part.0+0x20/0x20 [ 1198.442411][T23526] ? ___might_sleep+0x163/0x280 [ 1198.447268][T23526] __should_failslab+0x121/0x190 [ 1198.452212][T23526] should_failslab+0x9/0x14 [ 1198.456710][T23526] kmem_cache_alloc+0x2aa/0x710 [ 1198.461560][T23526] ? rwlock_bug.part.0+0x90/0x90 [ 1198.466497][T23526] ? __d_instantiate+0x82/0x470 [ 1198.471367][T23526] ? lock_downgrade+0x920/0x920 [ 1198.476218][T23526] __alloc_file+0x27/0x340 [ 1198.480632][T23526] alloc_empty_file+0x72/0x170 [ 1198.485394][T23526] alloc_file+0x5e/0x4d0 [ 1198.489637][T23526] alloc_file_pseudo+0x189/0x280 [ 1198.494572][T23526] ? alloc_file+0x4d0/0x4d0 [ 1198.499081][T23526] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1198.505320][T23526] __shmem_file_setup.part.0+0x108/0x2b0 [ 1198.511060][T23526] shmem_file_setup+0x66/0x90 [ 1198.523479][T23526] __x64_sys_memfd_create+0x2a2/0x470 [ 1198.528854][T23526] ? memfd_fcntl+0x18c0/0x18c0 [ 1198.533614][T23526] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1198.540155][T23526] ? trace_hardirqs_off_caller+0x65/0x230 [ 1198.545870][T23526] ? trace_hardirqs_on+0x67/0x240 [ 1198.550891][T23526] do_syscall_64+0xfa/0x760 [ 1198.555394][T23526] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1198.561276][T23526] RIP: 0033:0x459829 [ 1198.565164][T23526] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1198.584768][T23526] RSP: 002b:00007ff939d98a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1198.593181][T23526] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1198.601145][T23526] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1198.609113][T23526] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1198.617080][T23526] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff939d996d4 [ 1198.625046][T23526] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 [ 1198.633030][T23531] CPU: 1 PID: 23531 Comm: syz-executor.0 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1198.642146][T23531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1198.652191][T23531] Call Trace: [ 1198.655477][T23531] dump_stack+0x172/0x1f0 [ 1198.659799][T23531] should_fail.cold+0xa/0x15 [ 1198.664380][T23531] ? fault_create_debugfs_attr+0x180/0x180 [ 1198.670179][T23531] ? page_to_nid.part.0+0x20/0x20 [ 1198.676734][T23531] ? ___might_sleep+0x163/0x280 [ 1198.681582][T23531] __should_failslab+0x121/0x190 [ 1198.686514][T23531] should_failslab+0x9/0x14 [ 1198.691004][T23531] kmem_cache_alloc+0x2aa/0x710 [ 1198.695848][T23531] ? memcg_kmem_put_cache+0x3e/0x50 [ 1198.701033][T23531] ? kmem_cache_alloc+0x314/0x710 [ 1198.706049][T23531] security_file_alloc+0x39/0x170 [ 1198.711065][T23531] __alloc_file+0xde/0x340 [ 1198.715495][T23531] alloc_empty_file+0x72/0x170 [ 1198.720260][T23531] path_openat+0xef/0x4630 [ 1198.724669][T23531] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1198.730481][T23531] ? kasan_slab_alloc+0xf/0x20 [ 1198.735240][T23531] ? kmem_cache_alloc+0x121/0x710 [ 1198.740257][T23531] ? getname_flags+0xd6/0x5b0 [ 1198.744924][T23531] ? getname+0x1a/0x20 [ 1198.748980][T23531] ? do_sys_open+0x2c9/0x5d0 [ 1198.753556][T23531] ? __x64_sys_open+0x7e/0xc0 [ 1198.758246][T23531] ? do_syscall_64+0xfa/0x760 [ 1198.762919][T23531] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1198.768981][T23531] ? __isolate_free_page+0x4c0/0x4c0 [ 1198.774261][T23531] ? __kasan_check_read+0x11/0x20 [ 1198.779279][T23531] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1198.784657][T23531] ? __kasan_check_read+0x11/0x20 [ 1198.789683][T23531] ? __alloc_pages_nodemask+0x578/0x900 [ 1198.795221][T23531] ? cache_grow_end+0xa4/0x190 [ 1198.799978][T23531] ? __kasan_check_read+0x11/0x20 [ 1198.804998][T23531] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1198.810713][T23531] do_filp_open+0x1a1/0x280 [ 1198.815299][T23531] ? may_open_dev+0x100/0x100 [ 1198.819968][T23531] ? lock_downgrade+0x920/0x920 [ 1198.824835][T23531] ? rwlock_bug.part.0+0x90/0x90 [ 1198.829926][T23531] ? __alloc_fd+0x35/0x620 [ 1198.834337][T23531] ? __kasan_check_read+0x11/0x20 [ 1198.839370][T23531] ? do_raw_spin_unlock+0x57/0x270 [ 1198.844475][T23531] ? _raw_spin_unlock+0x2d/0x50 [ 1198.849317][T23531] ? __alloc_fd+0x487/0x620 [ 1198.853818][T23531] do_sys_open+0x3fe/0x5d0 [ 1198.858225][T23531] ? filp_open+0x80/0x80 [ 1198.862467][T23531] ? switch_fpu_return+0x1fa/0x4f0 [ 1198.867569][T23531] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1198.873725][T23531] __x64_sys_open+0x7e/0xc0 [ 1198.878218][T23531] do_syscall_64+0xfa/0x760 [ 1198.882719][T23531] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1198.888610][T23531] RIP: 0033:0x413711 [ 1198.892498][T23531] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1198.912093][T23531] RSP: 002b:00007fb6eb999a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1198.920496][T23531] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 07:31:52 executing program 1 (fault-call:1 fault-nth:4): r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1198.928474][T23531] RDX: 00007fb6eb999b0a RSI: 0000000000000002 RDI: 00007fb6eb999b00 [ 1198.936432][T23531] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1198.944405][T23531] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 1198.952451][T23531] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:31:52 executing program 0 (fault-call:1 fault-nth:12): r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1199.134629][T23545] FAULT_INJECTION: forcing a failure. [ 1199.134629][T23545] name failslab, interval 1, probability 0, space 0, times 0 [ 1199.152152][T23545] CPU: 1 PID: 23545 Comm: syz-executor.1 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1199.161280][T23545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1199.171330][T23545] Call Trace: [ 1199.174630][T23545] dump_stack+0x172/0x1f0 [ 1199.178968][T23545] should_fail.cold+0xa/0x15 07:31:52 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 07:31:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='h%s\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:31:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:31:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0xe0000, 0x0) [ 1199.183567][T23545] ? fault_create_debugfs_attr+0x180/0x180 [ 1199.189374][T23545] ? page_to_nid.part.0+0x20/0x20 [ 1199.194394][T23545] ? ___might_sleep+0x163/0x280 [ 1199.199256][T23545] __should_failslab+0x121/0x190 [ 1199.204204][T23545] should_failslab+0x9/0x14 [ 1199.208716][T23545] kmem_cache_alloc+0x2aa/0x710 [ 1199.213569][T23545] ? memcg_kmem_put_cache+0x3e/0x50 [ 1199.218767][T23545] ? kmem_cache_alloc+0x314/0x710 [ 1199.223798][T23545] security_file_alloc+0x39/0x170 [ 1199.228825][T23545] __alloc_file+0xde/0x340 [ 1199.233253][T23545] alloc_empty_file+0x72/0x170 [ 1199.238022][T23545] alloc_file+0x5e/0x4d0 [ 1199.242277][T23545] alloc_file_pseudo+0x189/0x280 [ 1199.247215][T23545] ? alloc_file+0x4d0/0x4d0 [ 1199.251727][T23545] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1199.257972][T23545] __shmem_file_setup.part.0+0x108/0x2b0 [ 1199.263608][T23545] shmem_file_setup+0x66/0x90 [ 1199.263627][T23545] __x64_sys_memfd_create+0x2a2/0x470 [ 1199.263641][T23545] ? memfd_fcntl+0x18c0/0x18c0 [ 1199.263657][T23545] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 07:31:52 executing program 1 (fault-call:1 fault-nth:5): r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1199.263673][T23545] ? trace_hardirqs_off_caller+0x65/0x230 [ 1199.263688][T23545] ? trace_hardirqs_on+0x67/0x240 [ 1199.263705][T23545] do_syscall_64+0xfa/0x760 [ 1199.263720][T23545] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1199.263731][T23545] RIP: 0033:0x459829 [ 1199.263747][T23545] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1199.263762][T23545] RSP: 002b:00007ff939d98a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1199.273805][T23545] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1199.288935][T23550] FAULT_INJECTION: forcing a failure. [ 1199.288935][T23550] name failslab, interval 1, probability 0, space 0, times 0 [ 1199.290294][T23545] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1199.290303][T23545] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1199.290312][T23545] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff939d996d4 [ 1199.290320][T23545] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 [ 1199.333378][T23550] CPU: 0 PID: 23550 Comm: syz-executor.0 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1199.345788][T23550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1199.345793][T23550] Call Trace: [ 1199.345814][T23550] dump_stack+0x172/0x1f0 [ 1199.345834][T23550] should_fail.cold+0xa/0x15 [ 1199.345851][T23550] ? fault_create_debugfs_attr+0x180/0x180 [ 1199.345873][T23550] ? kernel_text_address+0x73/0xf0 [ 1199.366487][T23550] ? ___might_sleep+0x163/0x280 [ 1199.366507][T23550] __should_failslab+0x121/0x190 [ 1199.366523][T23550] should_failslab+0x9/0x14 [ 1199.366542][T23550] __kmalloc+0x2e0/0x770 [ 1199.382469][T23550] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1199.382486][T23550] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1199.382501][T23550] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1199.382521][T23550] tomoyo_check_open_permission+0x2a8/0x3f0 [ 1199.399598][T23550] ? tomoyo_path_number_perm+0x520/0x520 [ 1199.399631][T23550] ? lock_downgrade+0x920/0x920 [ 1199.412975][T23550] ? rwlock_bug.part.0+0x90/0x90 [ 1199.412989][T23550] ? lockref_get+0x16/0x60 [ 1199.413006][T23550] tomoyo_file_open+0xa9/0xd0 [ 1199.413023][T23550] security_file_open+0x71/0x300 [ 1199.413045][T23550] do_dentry_open+0x373/0x1250 [ 1199.421923][T23550] ? match_exception_partial+0x242/0x2d0 [ 1199.421944][T23550] ? chown_common+0x5c0/0x5c0 [ 1199.421967][T23550] ? inode_permission+0xb4/0x560 [ 1199.432848][T23550] vfs_open+0xa0/0xd0 [ 1199.432865][T23550] path_openat+0x10e9/0x4630 [ 1199.432880][T23550] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1199.432900][T23550] ? kasan_slab_alloc+0xf/0x20 [ 1199.544636][T23550] ? kmem_cache_alloc+0x121/0x710 [ 1199.549756][T23550] ? getname_flags+0xd6/0x5b0 [ 1199.554436][T23550] ? getname+0x1a/0x20 [ 1199.558504][T23550] ? do_sys_open+0x2c9/0x5d0 [ 1199.563110][T23550] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1199.568484][T23550] ? __alloc_pages_nodemask+0x578/0x900 [ 1199.574030][T23550] ? cache_grow_end+0xa4/0x190 [ 1199.578796][T23550] ? __kasan_check_read+0x11/0x20 [ 1199.583823][T23550] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1199.589546][T23550] do_filp_open+0x1a1/0x280 [ 1199.594055][T23550] ? may_open_dev+0x100/0x100 [ 1199.598750][T23550] ? __kasan_check_read+0x11/0x20 [ 1199.603774][T23550] ? do_raw_spin_unlock+0x57/0x270 [ 1199.608888][T23550] ? _raw_spin_unlock+0x2d/0x50 [ 1199.613755][T23550] ? __alloc_fd+0x487/0x620 [ 1199.618271][T23550] do_sys_open+0x3fe/0x5d0 [ 1199.622693][T23550] ? filp_open+0x80/0x80 [ 1199.627009][T23550] ? switch_fpu_return+0x1fa/0x4f0 [ 1199.632124][T23550] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1199.638195][T23550] __x64_sys_open+0x7e/0xc0 [ 1199.642703][T23550] do_syscall_64+0xfa/0x760 [ 1199.647222][T23550] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1199.653110][T23550] RIP: 0033:0x413711 [ 1199.657014][T23550] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1199.676622][T23550] RSP: 002b:00007fb6eb999a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1199.685044][T23550] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 1199.693017][T23550] RDX: 00007fb6eb999b0a RSI: 0000000000000002 RDI: 00007fb6eb999b00 [ 1199.700989][T23550] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1199.708961][T23550] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 1199.716932][T23550] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 [ 1199.725772][T23550] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1199.782048][T23550] hfs: can't find a HFS filesystem on dev loop0 [ 1199.785183][T23562] FAULT_INJECTION: forcing a failure. [ 1199.785183][T23562] name failslab, interval 1, probability 0, space 0, times 0 [ 1199.805489][T23562] CPU: 0 PID: 23562 Comm: syz-executor.1 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1199.814956][T23562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1199.814961][T23562] Call Trace: [ 1199.814981][T23562] dump_stack+0x172/0x1f0 [ 1199.815000][T23562] should_fail.cold+0xa/0x15 [ 1199.815015][T23562] ? fault_create_debugfs_attr+0x180/0x180 [ 1199.815031][T23562] ? unwind_get_return_address+0x61/0xa0 [ 1199.815047][T23562] ? profile_setup.cold+0xbb/0xbb [ 1199.815070][T23562] ? ___might_sleep+0x163/0x280 [ 1199.828399][T23562] __should_failslab+0x121/0x190 [ 1199.828416][T23562] should_failslab+0x9/0x14 [ 1199.828434][T23562] __kmalloc+0x2e0/0x770 [ 1199.872189][T23562] ? mark_held_locks+0xf0/0xf0 [ 1199.876962][T23562] ? stack_trace_save+0xac/0xe0 [ 1199.881820][T23562] ? stack_trace_consume_entry+0x190/0x190 [ 1199.887625][T23562] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 1199.893433][T23562] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1199.899156][T23562] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1199.904786][T23562] ? tomoyo_path_perm+0x1cb/0x430 [ 1199.909816][T23562] tomoyo_path_perm+0x230/0x430 [ 1199.914666][T23562] ? tomoyo_path_perm+0x1cb/0x430 [ 1199.919692][T23562] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 1199.925768][T23562] ? __fget+0x35d/0x560 [ 1199.929925][T23562] ? __kasan_check_read+0x11/0x20 [ 1199.934954][T23562] ? __kasan_check_read+0x11/0x20 [ 1199.939983][T23562] ? __fget+0xa3/0x560 [ 1199.944065][T23562] ? lock_acquire+0x190/0x410 [ 1199.948749][T23562] ? do_sys_ftruncate+0x282/0x550 [ 1199.953776][T23562] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1199.960020][T23562] tomoyo_path_truncate+0x1d/0x30 [ 1199.965050][T23562] security_path_truncate+0xf2/0x150 [ 1199.970340][T23562] do_sys_ftruncate+0x3d9/0x550 [ 1199.975200][T23562] __x64_sys_ftruncate+0x59/0x80 [ 1199.980142][T23562] do_syscall_64+0xfa/0x760 [ 1199.984666][T23562] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1199.990645][T23562] RIP: 0033:0x4597f7 [ 1199.994544][T23562] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1200.014152][T23562] RSP: 002b:00007ff939d98a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 1200.022576][T23562] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597f7 07:31:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0xe0000, 0x0) [ 1200.030552][T23562] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000005 [ 1200.038528][T23562] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1200.046598][T23562] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000005 [ 1200.054575][T23562] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 [ 1200.072602][T23562] ERROR: Out of memory at tomoyo_realpath_from_path. 07:31:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:31:53 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 07:31:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1200.203280][T23562] hfs: can't find a HFS filesystem on dev loop1 07:31:53 executing program 1 (fault-call:1 fault-nth:6): r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='h\\s\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) [ 1200.383026][T23574] hfs: can't find a HFS filesystem on dev loop0 [ 1200.444699][T23583] FAULT_INJECTION: forcing a failure. [ 1200.444699][T23583] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1200.457950][T23583] CPU: 0 PID: 23583 Comm: syz-executor.1 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1200.467061][T23583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1200.477129][T23583] Call Trace: [ 1200.480458][T23583] dump_stack+0x172/0x1f0 [ 1200.484821][T23583] should_fail.cold+0xa/0x15 [ 1200.489553][T23583] ? fault_create_debugfs_attr+0x180/0x180 [ 1200.496849][T23583] ? is_bpf_text_address+0xac/0x170 [ 1200.504829][T23583] ? __kasan_check_read+0x11/0x20 [ 1200.509924][T23583] should_fail_alloc_page+0x50/0x60 [ 1200.515479][T23583] __alloc_pages_nodemask+0x1a1/0x900 [ 1200.520860][T23583] ? __bpf_address_lookup+0x310/0x310 [ 1200.526233][T23583] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1200.531952][T23583] ? __alloc_pages_slowpath+0x2530/0x2530 [ 1200.537669][T23583] ? kernel_text_address+0x73/0xf0 [ 1200.542773][T23583] ? fault_create_debugfs_attr+0x180/0x180 [ 1200.548572][T23583] cache_grow_begin+0x90/0xd20 [ 1200.553330][T23583] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1200.559046][T23583] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1200.565289][T23583] __kmalloc+0x6b2/0x770 [ 1200.569537][T23583] ? mark_held_locks+0xf0/0xf0 [ 1200.574299][T23583] ? stack_trace_save+0xac/0xe0 [ 1200.579150][T23583] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1200.584864][T23583] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1200.590408][T23583] ? tomoyo_path_perm+0x1cb/0x430 [ 1200.595428][T23583] tomoyo_path_perm+0x230/0x430 [ 1200.600269][T23583] ? tomoyo_path_perm+0x1cb/0x430 [ 1200.605303][T23583] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 1200.611360][T23583] ? __fget+0x35d/0x560 [ 1200.615507][T23583] ? __kasan_check_read+0x11/0x20 [ 1200.620527][T23583] ? __kasan_check_read+0x11/0x20 [ 1200.625548][T23583] ? __fget+0xa3/0x560 [ 1200.629622][T23583] ? lock_acquire+0x190/0x410 [ 1200.634296][T23583] ? do_sys_ftruncate+0x282/0x550 [ 1200.639321][T23583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1200.645558][T23583] tomoyo_path_truncate+0x1d/0x30 [ 1200.650580][T23583] security_path_truncate+0xf2/0x150 [ 1200.655878][T23583] do_sys_ftruncate+0x3d9/0x550 [ 1200.660726][T23583] __x64_sys_ftruncate+0x59/0x80 [ 1200.665664][T23583] do_syscall_64+0xfa/0x760 [ 1200.670167][T23583] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1200.677647][T23583] RIP: 0033:0x4597f7 [ 1200.681539][T23583] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1200.701136][T23583] RSP: 002b:00007ff939d98a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 1200.709546][T23583] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597f7 [ 1200.717510][T23583] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000005 [ 1200.725474][T23583] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1200.733435][T23583] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000005 [ 1200.741405][T23583] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:31:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 07:31:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0b") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0xe0000, 0x0) 07:31:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='\nfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1200.864355][T23583] hfs: can't find a HFS filesystem on dev loop1 07:31:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hf\n\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:31:54 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) 07:31:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0b") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0xe0000, 0x0) 07:31:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 07:31:54 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) 07:31:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='%fs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:54 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) 07:31:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0b") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0xe0000, 0x0) 07:31:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 07:31:54 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {}], 0x2, 0x0, 0x0, 0x0) 07:31:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='\\fs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hf#\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) [ 1201.622502][T23623] hfs: can't find a HFS filesystem on dev loop1 07:31:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='\nfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:54 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {}], 0x2, 0x0, 0x0, 0x0) 07:31:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57b") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0xe0000, 0x0) 07:31:54 executing program 5 (fault-call:2 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:31:54 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {}], 0x2, 0x0, 0x0, 0x0) 07:31:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='h\ns\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1201.906980][T23664] FAULT_INJECTION: forcing a failure. [ 1201.906980][T23664] name failslab, interval 1, probability 0, space 0, times 0 [ 1201.957754][T23664] CPU: 0 PID: 23664 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1201.966912][T23664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1201.977000][T23664] Call Trace: [ 1201.980319][T23664] dump_stack+0x172/0x1f0 [ 1201.984665][T23664] should_fail.cold+0xa/0x15 [ 1201.989296][T23664] ? fault_create_debugfs_attr+0x180/0x180 [ 1201.995112][T23664] ? page_to_nid.part.0+0x20/0x20 [ 1202.000140][T23664] ? ___might_sleep+0x163/0x280 [ 1202.005000][T23664] __should_failslab+0x121/0x190 [ 1202.009949][T23664] should_failslab+0x9/0x14 [ 1202.014463][T23664] __kmalloc+0x2e0/0x770 [ 1202.018716][T23664] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1202.024974][T23664] ? fput_many+0x12c/0x1a0 [ 1202.029396][T23664] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1202.035636][T23664] ? strnlen_user+0x1ed/0x2e0 [ 1202.040349][T23664] ? __x64_sys_memfd_create+0x13c/0x470 [ 1202.045928][T23664] __x64_sys_memfd_create+0x13c/0x470 [ 1202.051340][T23664] ? switch_fpu_return+0x1fa/0x4f0 [ 1202.056472][T23664] ? memfd_fcntl+0x18c0/0x18c0 [ 1202.061236][T23664] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1202.067305][T23664] ? trace_hardirqs_off_caller+0x65/0x230 [ 1202.073026][T23664] ? trace_hardirqs_on+0x67/0x240 [ 1202.078056][T23664] do_syscall_64+0xfa/0x760 [ 1202.082567][T23664] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1202.088459][T23664] RIP: 0033:0x459829 [ 1202.092355][T23664] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1202.111956][T23664] RSP: 002b:00007fb3c4759a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1202.120370][T23664] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1202.128345][T23664] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1202.136321][T23664] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1202.144295][T23664] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb3c475a6d4 07:31:55 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) 07:31:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hf%\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) [ 1202.152267][T23664] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:31:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57b") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0xe0000, 0x0) 07:31:55 executing program 5 (fault-call:2 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:31:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='%fs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:55 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) [ 1202.333854][T23682] FAULT_INJECTION: forcing a failure. [ 1202.333854][T23682] name failslab, interval 1, probability 0, space 0, times 0 [ 1202.349486][T23682] CPU: 1 PID: 23682 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1202.358604][T23682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1202.368748][T23682] Call Trace: [ 1202.372085][T23682] dump_stack+0x172/0x1f0 [ 1202.376437][T23682] should_fail.cold+0xa/0x15 [ 1202.381046][T23682] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1202.387227][T23682] ? fault_create_debugfs_attr+0x180/0x180 [ 1202.393046][T23682] ? page_to_nid.part.0+0x20/0x20 [ 1202.398079][T23682] ? ___might_sleep+0x163/0x280 [ 1202.402935][T23682] __should_failslab+0x121/0x190 [ 1202.407876][T23682] ? shmem_destroy_inode+0x80/0x80 [ 1202.412993][T23682] should_failslab+0x9/0x14 [ 1202.417501][T23682] kmem_cache_alloc+0x2aa/0x710 [ 1202.422351][T23682] ? __alloc_fd+0x487/0x620 [ 1202.426864][T23682] ? __kasan_check_read+0x11/0x20 [ 1202.431901][T23682] ? shmem_destroy_inode+0x80/0x80 [ 1202.437015][T23682] shmem_alloc_inode+0x1c/0x50 [ 1202.441784][T23682] alloc_inode+0x68/0x1e0 [ 1202.446117][T23682] new_inode_pseudo+0x19/0xf0 [ 1202.450790][T23682] new_inode+0x1f/0x40 [ 1202.454867][T23682] shmem_get_inode+0x84/0x7e0 [ 1202.459570][T23682] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1202.465119][T23682] shmem_file_setup+0x66/0x90 [ 1202.469804][T23682] __x64_sys_memfd_create+0x2a2/0x470 [ 1202.475178][T23682] ? memfd_fcntl+0x18c0/0x18c0 [ 1202.479946][T23682] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1202.486025][T23682] ? trace_hardirqs_off_caller+0x65/0x230 [ 1202.491748][T23682] ? trace_hardirqs_on+0x67/0x240 [ 1202.496780][T23682] do_syscall_64+0xfa/0x760 [ 1202.501293][T23682] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1202.507192][T23682] RIP: 0033:0x459829 [ 1202.523605][T23682] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1202.543302][T23682] RSP: 002b:00007fb3c4759a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1202.551721][T23682] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1202.559698][T23682] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1202.567671][T23682] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1202.575641][T23682] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb3c475a6d4 07:31:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='h%s\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1202.583616][T23682] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:31:55 executing program 5 (fault-call:2 fault-nth:2): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:31:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57b") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0xe0000, 0x0) 07:31:55 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) 07:31:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hf*\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) [ 1202.748736][T23696] FAULT_INJECTION: forcing a failure. [ 1202.748736][T23696] name failslab, interval 1, probability 0, space 0, times 0 [ 1202.779145][T23696] CPU: 1 PID: 23696 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1202.788303][T23696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1202.788309][T23696] Call Trace: [ 1202.788335][T23696] dump_stack+0x172/0x1f0 [ 1202.788356][T23696] should_fail.cold+0xa/0x15 [ 1202.788374][T23696] ? fault_create_debugfs_attr+0x180/0x180 [ 1202.788394][T23696] ? page_to_nid.part.0+0x20/0x20 [ 1202.788410][T23696] ? ___might_sleep+0x163/0x280 [ 1202.788430][T23696] __should_failslab+0x121/0x190 [ 1202.788446][T23696] should_failslab+0x9/0x14 [ 1202.788458][T23696] kmem_cache_alloc+0x2aa/0x710 [ 1202.788471][T23696] ? lock_acquire+0x190/0x410 07:31:55 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{}, {r1}], 0x2, 0x0, 0x0, 0x0) [ 1202.788487][T23696] ? current_time+0x6b/0x140 [ 1202.788509][T23696] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1202.816636][T23696] ? timespec64_trunc+0xf0/0x180 [ 1202.816652][T23696] __d_alloc+0x2e/0x8c0 [ 1202.816673][T23696] d_alloc_pseudo+0x1e/0x70 [ 1202.831450][T23696] alloc_file_pseudo+0xe2/0x280 [ 1202.831466][T23696] ? alloc_file+0x4d0/0x4d0 [ 1202.831489][T23696] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1202.845478][T23696] __shmem_file_setup.part.0+0x108/0x2b0 [ 1202.845496][T23696] shmem_file_setup+0x66/0x90 [ 1202.845517][T23696] __x64_sys_memfd_create+0x2a2/0x470 [ 1202.856319][T23696] ? memfd_fcntl+0x18c0/0x18c0 [ 1202.856338][T23696] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1202.856360][T23696] ? trace_hardirqs_off_caller+0x65/0x230 [ 1202.865434][T23696] ? trace_hardirqs_on+0x67/0x240 [ 1202.865456][T23696] do_syscall_64+0xfa/0x760 [ 1202.927123][T23696] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1202.933023][T23696] RIP: 0033:0x459829 [ 1202.936925][T23696] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1202.956537][T23696] RSP: 002b:00007fb3c4759a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1202.964960][T23696] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1202.972948][T23696] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1202.980927][T23696] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1202.988903][T23696] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb3c475a6d4 07:31:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='\\fs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1202.996884][T23696] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:31:56 executing program 5 (fault-call:2 fault-nth:3): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:31:56 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{}, {r1}], 0x2, 0x0, 0x0, 0x0) [ 1203.155524][T23714] FAULT_INJECTION: forcing a failure. [ 1203.155524][T23714] name failslab, interval 1, probability 0, space 0, times 0 [ 1203.171922][T23714] CPU: 0 PID: 23714 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1203.181049][T23714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1203.181056][T23714] Call Trace: [ 1203.181080][T23714] dump_stack+0x172/0x1f0 [ 1203.181106][T23714] should_fail.cold+0xa/0x15 [ 1203.203368][T23714] ? fault_create_debugfs_attr+0x180/0x180 [ 1203.209189][T23714] ? page_to_nid.part.0+0x20/0x20 [ 1203.214222][T23714] ? ___might_sleep+0x163/0x280 [ 1203.219079][T23714] __should_failslab+0x121/0x190 [ 1203.224025][T23714] should_failslab+0x9/0x14 [ 1203.228537][T23714] kmem_cache_alloc+0x2aa/0x710 [ 1203.233389][T23714] ? lock_acquire+0x190/0x410 [ 1203.238068][T23714] ? current_time+0x6b/0x140 [ 1203.242693][T23714] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1203.248963][T23714] ? timespec64_trunc+0xf0/0x180 [ 1203.253904][T23714] __d_alloc+0x2e/0x8c0 [ 1203.258066][T23714] d_alloc_pseudo+0x1e/0x70 [ 1203.262571][T23714] alloc_file_pseudo+0xe2/0x280 [ 1203.267424][T23714] ? alloc_file+0x4d0/0x4d0 [ 1203.271933][T23714] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1203.278181][T23714] __shmem_file_setup.part.0+0x108/0x2b0 [ 1203.283830][T23714] shmem_file_setup+0x66/0x90 [ 1203.288512][T23714] __x64_sys_memfd_create+0x2a2/0x470 [ 1203.293884][T23714] ? memfd_fcntl+0x18c0/0x18c0 [ 1203.298657][T23714] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1203.304728][T23714] ? trace_hardirqs_off_caller+0x65/0x230 [ 1203.310462][T23714] ? trace_hardirqs_on+0x67/0x240 [ 1203.315493][T23714] do_syscall_64+0xfa/0x760 [ 1203.320004][T23714] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1203.325895][T23714] RIP: 0033:0x459829 [ 1203.329796][T23714] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1203.349397][T23714] RSP: 002b:00007fb3c4759a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1203.357817][T23714] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1203.365792][T23714] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1203.373774][T23714] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1203.381760][T23714] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb3c475a6d4 [ 1203.389742][T23714] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:31:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf0") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0xe0000, 0x0) 07:31:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='h\\s\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:56 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:31:56 executing program 5 (fault-call:2 fault-nth:4): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:31:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hf+\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:31:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='h\ns\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1203.625170][T23731] FAULT_INJECTION: forcing a failure. [ 1203.625170][T23731] name failslab, interval 1, probability 0, space 0, times 0 [ 1203.652206][T23731] CPU: 0 PID: 23731 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1203.661344][T23731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1203.661350][T23731] Call Trace: [ 1203.661374][T23731] dump_stack+0x172/0x1f0 [ 1203.661400][T23731] should_fail.cold+0xa/0x15 [ 1203.683610][T23731] ? fault_create_debugfs_attr+0x180/0x180 [ 1203.689429][T23731] ? page_to_nid.part.0+0x20/0x20 [ 1203.689453][T23731] ? ___might_sleep+0x163/0x280 [ 1203.699297][T23731] __should_failslab+0x121/0x190 [ 1203.699318][T23731] should_failslab+0x9/0x14 [ 1203.708723][T23731] kmem_cache_alloc+0x2aa/0x710 [ 1203.713575][T23731] ? memcg_kmem_put_cache+0x3e/0x50 [ 1203.713588][T23731] ? kmem_cache_alloc+0x314/0x710 [ 1203.713607][T23731] security_file_alloc+0x39/0x170 [ 1203.713627][T23731] __alloc_file+0xde/0x340 [ 1203.723820][T23731] alloc_empty_file+0x72/0x170 [ 1203.723845][T23731] alloc_file+0x5e/0x4d0 [ 1203.738044][T23731] alloc_file_pseudo+0x189/0x280 [ 1203.738064][T23731] ? alloc_file+0x4d0/0x4d0 [ 1203.747219][T23731] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1203.747239][T23731] __shmem_file_setup.part.0+0x108/0x2b0 [ 1203.747258][T23731] shmem_file_setup+0x66/0x90 [ 1203.768355][T23731] __x64_sys_memfd_create+0x2a2/0x470 [ 1203.781125][T23731] ? memfd_fcntl+0x18c0/0x18c0 [ 1203.785903][T23731] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1203.791982][T23731] ? trace_hardirqs_off_caller+0x65/0x230 [ 1203.797722][T23731] ? trace_hardirqs_on+0x67/0x240 [ 1203.802769][T23731] do_syscall_64+0xfa/0x760 [ 1203.807288][T23731] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1203.813182][T23731] RIP: 0033:0x459829 [ 1203.817079][T23731] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1203.836684][T23731] RSP: 002b:00007fb3c4759a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1203.845104][T23731] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1203.853079][T23731] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1203.861055][T23731] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1203.869027][T23731] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb3c475a6d4 07:31:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf0") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0xe0000, 0x0) 07:31:56 executing program 4 (fault-call:6 fault-nth:0): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:31:56 executing program 5 (fault-call:2 fault-nth:5): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) [ 1203.877003][T23731] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:31:57 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:31:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hf\n\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1204.023890][T23753] FAULT_INJECTION: forcing a failure. [ 1204.023890][T23753] name failslab, interval 1, probability 0, space 0, times 0 [ 1204.036849][T23753] CPU: 0 PID: 23753 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1204.045965][T23753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1204.056024][T23753] Call Trace: [ 1204.059331][T23753] dump_stack+0x172/0x1f0 [ 1204.063675][T23753] should_fail.cold+0xa/0x15 [ 1204.068281][T23753] ? fault_create_debugfs_attr+0x180/0x180 [ 1204.074098][T23753] ? unwind_get_return_address+0x61/0xa0 [ 1204.079770][T23753] ? profile_setup.cold+0xbb/0xbb [ 1204.084805][T23753] ? ___might_sleep+0x163/0x280 [ 1204.089666][T23753] __should_failslab+0x121/0x190 [ 1204.094617][T23753] should_failslab+0x9/0x14 [ 1204.099120][T23753] __kmalloc+0x2e0/0x770 [ 1204.103373][T23753] ? mark_held_locks+0xf0/0xf0 [ 1204.108143][T23753] ? stack_trace_save+0xac/0xe0 [ 1204.113004][T23753] ? stack_trace_consume_entry+0x190/0x190 [ 1204.118815][T23753] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 1204.124630][T23753] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1204.130365][T23753] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1204.135916][T23753] ? tomoyo_path_perm+0x1cb/0x430 [ 1204.140951][T23753] tomoyo_path_perm+0x230/0x430 [ 1204.145900][T23753] ? tomoyo_path_perm+0x1cb/0x430 [ 1204.150930][T23753] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 1204.156999][T23753] ? __fget+0x35d/0x560 [ 1204.161182][T23753] ? __kasan_check_read+0x11/0x20 [ 1204.166207][T23753] ? __kasan_check_read+0x11/0x20 [ 1204.171233][T23753] ? __fget+0xa3/0x560 [ 1204.175323][T23753] ? lock_acquire+0x190/0x410 [ 1204.180006][T23753] ? do_sys_ftruncate+0x282/0x550 [ 1204.185033][T23753] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1204.191363][T23753] tomoyo_path_truncate+0x1d/0x30 [ 1204.196393][T23753] security_path_truncate+0xf2/0x150 [ 1204.201682][T23753] do_sys_ftruncate+0x3d9/0x550 [ 1204.206544][T23753] __x64_sys_ftruncate+0x59/0x80 [ 1204.211484][T23753] do_syscall_64+0xfa/0x760 [ 1204.215994][T23753] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1204.221882][T23753] RIP: 0033:0x4597f7 [ 1204.225777][T23753] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1204.245383][T23753] RSP: 002b:00007fb3c4759a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 1204.253806][T23753] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597f7 [ 1204.261781][T23753] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000005 07:31:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hf-\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) [ 1204.269764][T23753] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1204.277745][T23753] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000005 [ 1204.285752][T23753] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 [ 1204.305154][T23753] ERROR: Out of memory at tomoyo_realpath_from_path. 07:31:57 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0xfffffdfe, 0x0, 0x0, 0x0) 07:31:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf0") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0xe0000, 0x0) 07:31:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='h%s\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:57 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000040)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x40000, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)) ioctl$SCSI_IOCTL_START_UNIT(r2, 0x5) r3 = syz_open_pts(r2, 0x0) dup3(r3, r2, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x1f) ppoll(&(0x7f00000001c0)=[{r3}, {r2}], 0x2, 0x0, 0x0, 0x0) 07:31:57 executing program 5 (fault-call:2 fault-nth:6): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:31:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hf#\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0xe0000, 0x0) 07:31:57 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) getegid() openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200000, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) [ 1204.749396][T23879] FAULT_INJECTION: forcing a failure. [ 1204.749396][T23879] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1204.762636][T23879] CPU: 0 PID: 23879 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1204.771741][T23879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1204.781807][T23879] Call Trace: [ 1204.785112][T23879] dump_stack+0x172/0x1f0 [ 1204.789453][T23879] should_fail.cold+0xa/0x15 [ 1204.794058][T23879] ? fault_create_debugfs_attr+0x180/0x180 [ 1204.799869][T23879] ? is_bpf_text_address+0xac/0x170 [ 1204.805072][T23879] ? __kasan_check_read+0x11/0x20 [ 1204.810138][T23879] should_fail_alloc_page+0x50/0x60 [ 1204.815342][T23879] __alloc_pages_nodemask+0x1a1/0x900 [ 1204.820714][T23879] ? __bpf_address_lookup+0x310/0x310 [ 1204.826099][T23879] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1204.831821][T23879] ? __alloc_pages_slowpath+0x2530/0x2530 [ 1204.837546][T23879] ? kernel_text_address+0x73/0xf0 [ 1204.842664][T23879] ? fault_create_debugfs_attr+0x180/0x180 [ 1204.848475][T23879] cache_grow_begin+0x90/0xd20 [ 1204.853240][T23879] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1204.859008][T23879] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1204.865270][T23879] __kmalloc+0x6b2/0x770 [ 1204.869515][T23879] ? mark_held_locks+0xf0/0xf0 [ 1204.874283][T23879] ? stack_trace_save+0xac/0xe0 [ 1204.879137][T23879] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1204.884855][T23879] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1204.890398][T23879] ? tomoyo_path_perm+0x1cb/0x430 [ 1204.895426][T23879] tomoyo_path_perm+0x230/0x430 [ 1204.900277][T23879] ? tomoyo_path_perm+0x1cb/0x430 [ 1204.905302][T23879] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 1204.911377][T23879] ? __fget+0x35d/0x560 [ 1204.915539][T23879] ? __kasan_check_read+0x11/0x20 [ 1204.920562][T23879] ? __kasan_check_read+0x11/0x20 [ 1204.925590][T23879] ? __fget+0xa3/0x560 [ 1204.929670][T23879] ? lock_acquire+0x190/0x410 [ 1204.934348][T23879] ? do_sys_ftruncate+0x282/0x550 [ 1204.939375][T23879] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1204.945619][T23879] tomoyo_path_truncate+0x1d/0x30 [ 1204.950656][T23879] security_path_truncate+0xf2/0x150 [ 1204.955959][T23879] do_sys_ftruncate+0x3d9/0x550 [ 1204.960831][T23879] __x64_sys_ftruncate+0x59/0x80 [ 1204.965782][T23879] do_syscall_64+0xfa/0x760 [ 1204.970298][T23879] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1204.976188][T23879] RIP: 0033:0x4597f7 [ 1204.980084][T23879] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1204.999692][T23879] RSP: 002b:00007fb3c4759a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 1205.008108][T23879] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597f7 [ 1205.016076][T23879] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000005 [ 1205.024049][T23879] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1205.032017][T23879] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000005 [ 1205.039987][T23879] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:31:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='h\\s\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1205.077898][T23883] Unknown ioctl 35090 07:31:58 executing program 5 (fault-call:2 fault-nth:7): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:31:58 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000240)={r3, @multicast2, @loopback}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000140)) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000040)) r5 = syz_open_pts(r4, 0x0) dup3(r5, r4, 0x0) ppoll(&(0x7f00000001c0)=[{r5}, {r4}], 0x2, 0x0, 0x0, 0x0) 07:31:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hf.\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) [ 1205.265832][T23997] FAULT_INJECTION: forcing a failure. [ 1205.265832][T23997] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1205.279224][T23997] CPU: 1 PID: 23997 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1205.288340][T23997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1205.298394][T23997] Call Trace: [ 1205.301693][T23997] dump_stack+0x172/0x1f0 [ 1205.306036][T23997] should_fail.cold+0xa/0x15 [ 1205.310643][T23997] ? fault_create_debugfs_attr+0x180/0x180 [ 1205.316451][T23997] ? is_bpf_text_address+0xac/0x170 [ 1205.321648][T23997] ? __kasan_check_read+0x11/0x20 [ 1205.326685][T23997] should_fail_alloc_page+0x50/0x60 [ 1205.331888][T23997] __alloc_pages_nodemask+0x1a1/0x900 [ 1205.337265][T23997] ? __bpf_address_lookup+0x310/0x310 [ 1205.342638][T23997] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1205.348361][T23997] ? __alloc_pages_slowpath+0x2530/0x2530 [ 1205.354091][T23997] ? kernel_text_address+0x73/0xf0 [ 1205.359210][T23997] ? fault_create_debugfs_attr+0x180/0x180 [ 1205.365113][T23997] cache_grow_begin+0x90/0xd20 [ 1205.369883][T23997] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1205.375603][T23997] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1205.381850][T23997] __kmalloc+0x6b2/0x770 [ 1205.386094][T23997] ? mark_held_locks+0xf0/0xf0 [ 1205.390881][T23997] ? stack_trace_save+0xac/0xe0 [ 1205.395743][T23997] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1205.401471][T23997] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1205.407017][T23997] ? tomoyo_path_perm+0x1cb/0x430 [ 1205.412048][T23997] tomoyo_path_perm+0x230/0x430 [ 1205.416904][T23997] ? tomoyo_path_perm+0x1cb/0x430 [ 1205.421929][T23997] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 1205.427992][T23997] ? __fget+0x35d/0x560 [ 1205.433012][T23997] ? __kasan_check_read+0x11/0x20 [ 1205.438036][T23997] ? __kasan_check_read+0x11/0x20 [ 1205.443061][T23997] ? __fget+0xa3/0x560 [ 1205.447141][T23997] ? lock_acquire+0x190/0x410 [ 1205.451822][T23997] ? do_sys_ftruncate+0x282/0x550 [ 1205.456865][T23997] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1205.463112][T23997] tomoyo_path_truncate+0x1d/0x30 [ 1205.468139][T23997] security_path_truncate+0xf2/0x150 [ 1205.473430][T23997] do_sys_ftruncate+0x3d9/0x550 [ 1205.478287][T23997] __x64_sys_ftruncate+0x59/0x80 [ 1205.483229][T23997] do_syscall_64+0xfa/0x760 [ 1205.487866][T23997] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1205.493756][T23997] RIP: 0033:0x4597f7 [ 1205.497655][T23997] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1205.517356][T23997] RSP: 002b:00007fb3c4759a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 1205.525772][T23997] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597f7 [ 1205.533745][T23997] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000005 [ 1205.542571][T23997] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1205.550548][T23997] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000005 [ 1205.558523][T23997] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:31:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hf%\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0xe0000, 0x0) 07:31:58 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup2(r0, r1) ioctl$KDENABIO(r2, 0x4b36) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000140)) r4 = syz_open_pts(r3, 0x0) dup3(r4, r3, 0x0) ppoll(&(0x7f00000001c0)=[{r4}, {r3}], 0x2, 0x0, 0x0, 0x0) 07:31:58 executing program 5 (fault-call:2 fault-nth:8): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:31:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hf\n\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hf*\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1205.863726][T24193] FAULT_INJECTION: forcing a failure. [ 1205.863726][T24193] name failslab, interval 1, probability 0, space 0, times 0 [ 1205.896546][T24193] CPU: 0 PID: 24193 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1205.905685][T24193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1205.915749][T24193] Call Trace: [ 1205.919052][T24193] dump_stack+0x172/0x1f0 [ 1205.923408][T24193] should_fail.cold+0xa/0x15 [ 1205.928009][T24193] ? __kasan_check_read+0x11/0x20 [ 1205.933048][T24193] ? fault_create_debugfs_attr+0x180/0x180 [ 1205.938860][T24193] ? __kasan_check_write+0x14/0x20 [ 1205.943976][T24193] ? lock_downgrade+0x920/0x920 [ 1205.948842][T24193] ? ___might_sleep+0x163/0x280 [ 1205.953707][T24193] __should_failslab+0x121/0x190 [ 1205.958665][T24193] should_failslab+0x9/0x14 [ 1205.963183][T24193] __kmalloc+0x2e0/0x770 [ 1205.967437][T24193] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1205.973684][T24193] ? simple_dname+0xd1/0x1f0 [ 1205.978276][T24193] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1205.983665][T24193] tomoyo_encode2.part.0+0xf5/0x400 [ 1205.988868][T24193] tomoyo_encode+0x2b/0x50 [ 1205.993289][T24193] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 1205.998940][T24193] ? tomoyo_path_perm+0x1cb/0x430 [ 1206.003967][T24193] tomoyo_path_perm+0x230/0x430 [ 1206.008817][T24193] ? tomoyo_path_perm+0x1cb/0x430 [ 1206.013848][T24193] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 1206.019915][T24193] ? __fget+0x35d/0x560 [ 1206.024096][T24193] ? __kasan_check_read+0x11/0x20 [ 1206.029121][T24193] ? __kasan_check_read+0x11/0x20 [ 1206.034154][T24193] ? __fget+0xa3/0x560 [ 1206.038242][T24193] ? lock_acquire+0x190/0x410 [ 1206.042925][T24193] ? do_sys_ftruncate+0x282/0x550 [ 1206.047955][T24193] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1206.054201][T24193] tomoyo_path_truncate+0x1d/0x30 [ 1206.059236][T24193] security_path_truncate+0xf2/0x150 [ 1206.064530][T24193] do_sys_ftruncate+0x3d9/0x550 [ 1206.069390][T24193] __x64_sys_ftruncate+0x59/0x80 [ 1206.074336][T24193] do_syscall_64+0xfa/0x760 [ 1206.078845][T24193] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1206.084743][T24193] RIP: 0033:0x4597f7 [ 1206.088652][T24193] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1206.108257][T24193] RSP: 002b:00007fb3c4759a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 1206.116682][T24193] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597f7 [ 1206.124754][T24193] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000005 [ 1206.132749][T24193] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1206.140744][T24193] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000005 [ 1206.148720][T24193] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:31:59 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x600000, 0x80040) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$VIDIOC_G_EDID(r4, 0xc0285628, &(0x7f00000000c0)={0x0, 0x2, 0x2, [], &(0x7f0000000040)=0x6}) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:31:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0xe0000, 0x0) [ 1206.170650][T24193] ERROR: Out of memory at tomoyo_realpath_from_path. 07:31:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:31:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hf/\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:31:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hf#\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:31:59 executing program 5 (fault-call:2 fault-nth:9): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:31:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0xe0000, 0x0) 07:31:59 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xffffffffffffffff) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x8, 0x4000) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f00000000c0)={{0x3, 0x3, 0x5b513387, 0x3, 0x7fffffff}}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)) r3 = syz_open_pts(r2, 0x0) dup3(r3, r2, 0x0) ppoll(&(0x7f00000001c0)=[{r3}, {r2}], 0x2, 0x0, 0x0, 0x0) [ 1206.479794][T24347] FAULT_INJECTION: forcing a failure. [ 1206.479794][T24347] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1206.493106][T24347] CPU: 1 PID: 24347 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1206.493116][T24347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1206.493121][T24347] Call Trace: [ 1206.493146][T24347] dump_stack+0x172/0x1f0 [ 1206.493169][T24347] should_fail.cold+0xa/0x15 [ 1206.493189][T24347] ? fault_create_debugfs_attr+0x180/0x180 [ 1206.493203][T24347] ? rwlock_bug.part.0+0x90/0x90 [ 1206.493221][T24347] ? current_time+0x6b/0x140 [ 1206.493249][T24347] should_fail_alloc_page+0x50/0x60 [ 1206.493264][T24347] __alloc_pages_nodemask+0x1a1/0x900 [ 1206.493288][T24347] ? __kasan_check_read+0x11/0x20 [ 1206.522713][T24347] ? __alloc_pages_slowpath+0x2530/0x2530 [ 1206.522729][T24347] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1206.522741][T24347] ? __kasan_check_read+0x11/0x20 [ 1206.522761][T24347] ? fault_create_debugfs_attr+0x180/0x180 [ 1206.522775][T24347] cache_grow_begin+0x90/0xd20 [ 1206.522798][T24347] ? getname_flags+0xd6/0x5b0 [ 1206.555448][T24347] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1206.582130][T24347] kmem_cache_alloc+0x64e/0x710 [ 1206.582146][T24347] ? __kasan_check_write+0x14/0x20 [ 1206.582165][T24347] getname_flags+0xd6/0x5b0 [ 1206.582181][T24347] getname+0x1a/0x20 [ 1206.582192][T24347] do_sys_open+0x2c9/0x5d0 [ 1206.582206][T24347] ? filp_open+0x80/0x80 [ 1206.582229][T24347] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1206.636842][T24347] ? fput+0x1b/0x20 [ 1206.640657][T24347] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1206.646731][T24347] __x64_sys_open+0x7e/0xc0 [ 1206.651247][T24347] do_syscall_64+0xfa/0x760 [ 1206.655755][T24347] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1206.661645][T24347] RIP: 0033:0x413711 07:31:59 executing program 4: r0 = socket(0x1, 0x800, 0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000040)=0x1c) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000200)={r1, 0x9f, "b06864b8024e250fa2b72d5b1a6f9d2ff85393b2d191cf978a2df5267fb72186edee06d10b693f8e117da8d9da305f736f5231e5c39e748b6ab63d68ce9aaca18a77e9f09cf3ceeb1d1ab88b5a6172c7fb3c4942010b59c4654988a1851c3d82aef2f09676f0d7033544647d98931fcf70a6f197304fd8817909e00f67165ee3a32ca6d062f3303fdb3bc0acc5c398c2815bf213f72b37bcacea6616051a4b"}, &(0x7f00000000c0)=0xa7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000140)) r4 = syz_open_pts(r3, 0x0) dup3(r4, r3, 0x0) ppoll(&(0x7f00000001c0)=[{r4}, {r3}], 0x2, 0x0, 0x0, 0x0) 07:31:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hf+\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1206.665540][T24347] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1206.686645][T24347] RSP: 002b:00007fb3c4759a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1206.695059][T24347] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 1206.703028][T24347] RDX: 00007fb3c4759b0a RSI: 0000000000000002 RDI: 00007fb3c4759b00 [ 1206.703037][T24347] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1206.703045][T24347] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 1206.703053][T24347] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:31:59 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000000)={0x0, 0x3c, "bc4f284072fbdf8f40d296c465bd797e3b8c3adffe9c1b91dfc28d1e8a86c0e01ad98e84cec5a39414f7a1c86f287b8f3d6ee5681cfd8c73ce7cbbe1"}) 07:32:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 07:32:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hf%\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:00 executing program 5 (fault-call:2 fault-nth:10): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:32:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hf0\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hf-\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:00 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)) r3 = syz_open_pts(r2, 0x0) r4 = fcntl$dupfd(r0, 0x0, r3) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r4, 0xc0305616, &(0x7f0000000000)={0x0, {0xff, 0x1}}) sendmmsg$inet_sctp(r4, &(0x7f0000001940)=[{&(0x7f00000000c0)=@in6={0xa, 0x4e24, 0x4, @mcast2, 0x6125}, 0x1c, &(0x7f0000000200)=[{&(0x7f0000000100)="5b037cf4db43499c8dd144427299abba", 0x10}], 0x1, 0x0, 0x0, 0x850}, {&(0x7f0000000240)=@in6={0xa, 0x4e23, 0x2, @rand_addr="01e518417805fa2f3d4469afb2d36fe7", 0x9}, 0x1c, &(0x7f00000016c0)=[{&(0x7f0000000280)="39e6991f5bc653d2bff6", 0xa}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000012c0)="8f25fcc72d29eaeaeb87e30544f0af9a5c1e9b4645ff37d91dd92f70ec55f06784bf55270bf13e0c739069b619647c6bbb217dcd118fe60a20b333d1d7ebb54e8c61d74e9bfc3b17f089a56e44edda8211547f6b130f4a9e235f61b81329", 0x5e}, {&(0x7f0000001340)="3185f6857ee4533a0225ae32bfa9133b7ccad1f78adef8b33bb4721fc0f135ca2c8b5a4755f9fe9e4bf9dccccbcaf6ccdb8e0f741b6e4ea26796ff3f6644e52ea2e43f770b50eb573d18177463ca7c886168158a2c9684bffdd5aa8f8cd341322d78763afa169a1a2efe97c625f23272fb8acca60887b70e160e325bf55a7107aac396193b8b71c5c4a840e54a6abd3d43fe7603fd5a0ce21dba556a", 0x9c}, {&(0x7f0000001400)="ecbe3f6030789bc8008087dd600d88b8df6f5730836cf0d6b63b331769de7bddf1fc2a73fcd01296fe0f1a0b9e6d9e643bcf07b7a77a92ef507462460f22ebea30710750ed01cdbc83f8b4fffbef71063b1ccd8d9347cd4ec735767c2ef2204b84cef5af9c0a3445ae266f0bda248fe7d768b9fd6c6b89a57fbbf24fbbca462a0db08791befe7a4f7def50357baa683eeaef76a069a9e4ac5afe758671197b0dfb35ad85e7062b0d06d18e930366502cfa4326689193c0f24c078d2a698da09d250d", 0xc2}, {&(0x7f0000001500)="46a1a6641a9b097b3f4918bd02af25a7f07db54511fc546d1f4920c7d788eba59abc27723d4f8283735bbb4508381028657c4e1aec376d774edef0e8e75b6ff540715b2dadddf6e4a8661cf8813ec8dd965fae244793d109b4caf193de988745911a108ea6857ee9bf45b3ef6479c21a481c8a739717f11ce11eca4958954307d70bb49b263979fcb140f0b05bdcea", 0x8f}, {&(0x7f00000015c0)="523cbb821d0b374d012b37e4fab77e31b9d5ab3bba6cdd8c7d6a20143aafd3e4511fdd965b61ca8b13a72d90c5efaa77fd36e9720bb43735014b8b7d9821a4089b02b0c1272031f9f5a0c13e129da5c0d435ff6cba744c9c8c627aa1c09431a44f6d678aa1bca1b3ed5e7f3aace675e7faf571b5bfe912a0dc19efdfb72c6e3f54e1198dbbc96d751344485cf67ba1ef1c003eedc920381516fb55e7fd0614e95f8f083c8ee8c858895d2947b01c7850d38b3303abd141cb675151fce69c8cc4315803576d82b7ea984970f779c3f3307add23de5af7fbe73dec1dab3e90cc4829269cd8e17343314d5eb3fb93fda5bae14e1bd8fc3c879f", 0xf8}], 0x7, &(0x7f0000001740)=[@authinfo={0x18, 0x84, 0x6, {0x100000001}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast1}, @authinfo={0x18, 0x84, 0x6, {0x6f1}}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x1000}}, @dstaddrv6={0x20, 0x84, 0x8, @loopback}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x5}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x9}}], 0xb0}, {&(0x7f0000001800)=@in6={0xa, 0x4e22, 0x7, @remote, 0x8}, 0x1c, &(0x7f0000001880)=[{&(0x7f0000001840)="812da021657353db6b9aee608b93b7afbc17923734126d4fd2596bf3880aac7c9aac9498205b572a3dcbc9765375dd", 0x2f}], 0x1, &(0x7f00000018c0)=[@authinfo={0x18, 0x84, 0x6, {0xffffffff}}, @dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0x4}, @dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0x7ff}, @dstaddrv6={0x20, 0x84, 0x8, @initdev={0xfe, 0x88, [], 0x1, 0x0}}], 0x68, 0x4008004}], 0x3, 0x4000000) dup3(r3, r2, 0x0) ppoll(&(0x7f00000001c0)=[{r3}, {r2}], 0x2, 0x0, 0x0, 0x0) [ 1207.106877][T24677] FAULT_INJECTION: forcing a failure. [ 1207.106877][T24677] name failslab, interval 1, probability 0, space 0, times 0 [ 1207.141958][T24677] CPU: 1 PID: 24677 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1207.151092][T24677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1207.161162][T24677] Call Trace: [ 1207.164469][T24677] dump_stack+0x172/0x1f0 [ 1207.168815][T24677] should_fail.cold+0xa/0x15 [ 1207.173407][T24677] ? is_bpf_text_address+0xd3/0x170 [ 1207.178613][T24677] ? fault_create_debugfs_attr+0x180/0x180 [ 1207.184423][T24677] ? page_to_nid.part.0+0x20/0x20 [ 1207.189454][T24677] ? ___might_sleep+0x163/0x280 [ 1207.194311][T24677] __should_failslab+0x121/0x190 [ 1207.199259][T24677] should_failslab+0x9/0x14 [ 1207.203768][T24677] kmem_cache_alloc+0x2aa/0x710 [ 1207.208624][T24677] ? stack_trace_save+0xac/0xe0 [ 1207.213479][T24677] ? stack_trace_consume_entry+0x190/0x190 [ 1207.219300][T24677] __alloc_file+0x27/0x340 [ 1207.223717][T24677] alloc_empty_file+0x72/0x170 [ 1207.228486][T24677] path_openat+0xef/0x4630 [ 1207.232905][T24677] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1207.238718][T24677] ? kasan_slab_alloc+0xf/0x20 [ 1207.243479][T24677] ? kmem_cache_alloc+0x121/0x710 [ 1207.248494][T24677] ? getname_flags+0xd6/0x5b0 [ 1207.248508][T24677] ? getname+0x1a/0x20 [ 1207.248519][T24677] ? do_sys_open+0x2c9/0x5d0 [ 1207.248536][T24677] ? __x64_sys_open+0x7e/0xc0 [ 1207.266489][T24677] ? do_syscall_64+0xfa/0x760 [ 1207.271175][T24677] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1207.277337][T24677] ? __isolate_free_page+0x4c0/0x4c0 [ 1207.282623][T24677] ? __kasan_check_read+0x11/0x20 [ 1207.287651][T24677] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1207.293025][T24677] ? __kasan_check_read+0x11/0x20 [ 1207.298053][T24677] ? __alloc_pages_nodemask+0x578/0x900 [ 1207.303600][T24677] ? cache_grow_end+0xa4/0x190 [ 1207.308367][T24677] ? __kasan_check_read+0x11/0x20 [ 1207.313415][T24677] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1207.319140][T24677] do_filp_open+0x1a1/0x280 [ 1207.323641][T24677] ? may_open_dev+0x100/0x100 [ 1207.323659][T24677] ? lock_downgrade+0x920/0x920 [ 1207.323673][T24677] ? rwlock_bug.part.0+0x90/0x90 [ 1207.323692][T24677] ? __alloc_fd+0x35/0x620 [ 1207.333196][T24677] ? __kasan_check_read+0x11/0x20 [ 1207.333209][T24677] ? do_raw_spin_unlock+0x57/0x270 [ 1207.333225][T24677] ? _raw_spin_unlock+0x2d/0x50 [ 1207.333243][T24677] ? __alloc_fd+0x487/0x620 [ 1207.333263][T24677] do_sys_open+0x3fe/0x5d0 [ 1207.333280][T24677] ? filp_open+0x80/0x80 [ 1207.370704][T24677] ? switch_fpu_return+0x1fa/0x4f0 [ 1207.375823][T24677] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1207.381894][T24677] __x64_sys_open+0x7e/0xc0 [ 1207.386401][T24677] do_syscall_64+0xfa/0x760 [ 1207.390910][T24677] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1207.396801][T24677] RIP: 0033:0x413711 [ 1207.400700][T24677] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1207.420312][T24677] RSP: 002b:00007fb3c4759a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1207.428725][T24677] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 1207.436701][T24677] RDX: 00007fb3c4759b0a RSI: 0000000000000002 RDI: 00007fb3c4759b00 [ 1207.444678][T24677] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 07:32:00 executing program 5 (fault-call:2 fault-nth:11): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) [ 1207.452650][T24677] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 1207.460621][T24677] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:32:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 07:32:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hf*\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1207.586057][T24696] FAULT_INJECTION: forcing a failure. [ 1207.586057][T24696] name failslab, interval 1, probability 0, space 0, times 0 [ 1207.635479][T24696] CPU: 1 PID: 24696 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1207.644633][T24696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1207.655652][T24696] Call Trace: [ 1207.658958][T24696] dump_stack+0x172/0x1f0 [ 1207.663307][T24696] should_fail.cold+0xa/0x15 [ 1207.667899][T24696] ? is_bpf_text_address+0xd3/0x170 [ 1207.673102][T24696] ? fault_create_debugfs_attr+0x180/0x180 [ 1207.678913][T24696] ? page_to_nid.part.0+0x20/0x20 [ 1207.683940][T24696] ? ___might_sleep+0x163/0x280 [ 1207.688794][T24696] __should_failslab+0x121/0x190 [ 1207.693731][T24696] should_failslab+0x9/0x14 [ 1207.698226][T24696] kmem_cache_alloc+0x2aa/0x710 [ 1207.703088][T24696] ? stack_trace_save+0xac/0xe0 [ 1207.707944][T24696] ? stack_trace_consume_entry+0x190/0x190 [ 1207.713753][T24696] __alloc_file+0x27/0x340 [ 1207.718172][T24696] alloc_empty_file+0x72/0x170 [ 1207.722942][T24696] path_openat+0xef/0x4630 [ 1207.727356][T24696] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1207.733159][T24696] ? kasan_slab_alloc+0xf/0x20 [ 1207.737916][T24696] ? kmem_cache_alloc+0x121/0x710 [ 1207.742942][T24696] ? getname_flags+0xd6/0x5b0 [ 1207.747624][T24696] ? getname+0x1a/0x20 [ 1207.751687][T24696] ? do_sys_open+0x2c9/0x5d0 [ 1207.756274][T24696] ? __x64_sys_open+0x7e/0xc0 [ 1207.760977][T24696] ? do_syscall_64+0xfa/0x760 [ 1207.765659][T24696] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1207.771728][T24696] ? __isolate_free_page+0x4c0/0x4c0 [ 1207.777017][T24696] ? __kasan_check_read+0x11/0x20 [ 1207.782043][T24696] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1207.787413][T24696] ? __kasan_check_read+0x11/0x20 [ 1207.792433][T24696] ? __alloc_pages_nodemask+0x578/0x900 [ 1207.797974][T24696] ? cache_grow_end+0xa4/0x190 [ 1207.802736][T24696] ? __kasan_check_read+0x11/0x20 [ 1207.807767][T24696] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1207.813487][T24696] do_filp_open+0x1a1/0x280 [ 1207.817989][T24696] ? may_open_dev+0x100/0x100 [ 1207.822669][T24696] ? lock_downgrade+0x920/0x920 [ 1207.827529][T24696] ? rwlock_bug.part.0+0x90/0x90 [ 1207.832462][T24696] ? __alloc_fd+0x35/0x620 [ 1207.836885][T24696] ? __kasan_check_read+0x11/0x20 [ 1207.841911][T24696] ? do_raw_spin_unlock+0x57/0x270 [ 1207.847548][T24696] ? _raw_spin_unlock+0x2d/0x50 [ 1207.852398][T24696] ? __alloc_fd+0x487/0x620 [ 1207.856903][T24696] do_sys_open+0x3fe/0x5d0 [ 1207.861320][T24696] ? filp_open+0x80/0x80 [ 1207.865572][T24696] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1207.872073][T24696] ? fput+0x1b/0x20 [ 1207.875883][T24696] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1207.881948][T24696] __x64_sys_open+0x7e/0xc0 [ 1207.886479][T24696] do_syscall_64+0xfa/0x760 [ 1207.890982][T24696] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1207.896873][T24696] RIP: 0033:0x413711 [ 1207.900772][T24696] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1207.920380][T24696] RSP: 002b:00007fb3c4759a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1207.928794][T24696] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 1207.936767][T24696] RDX: 00007fb3c4759b0a RSI: 0000000000000002 RDI: 00007fb3c4759b00 [ 1207.944737][T24696] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1207.952702][T24696] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 1207.960664][T24696] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:32:01 executing program 5 (fault-call:2 fault-nth:12): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:32:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfX\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hf.\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:01 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x22004, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0xbf5fa4cad0592ff9, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x3, 0x0, 0x0, 0x9}) r3 = syz_open_pts(r1, 0xc0400) dup3(r3, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r3}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:32:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hf+\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1208.189038][T24809] FAULT_INJECTION: forcing a failure. [ 1208.189038][T24809] name failslab, interval 1, probability 0, space 0, times 0 07:32:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1208.244703][T24809] CPU: 0 PID: 24809 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1208.253846][T24809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1208.263916][T24809] Call Trace: [ 1208.267222][T24809] dump_stack+0x172/0x1f0 [ 1208.267243][T24809] should_fail.cold+0xa/0x15 [ 1208.267264][T24809] ? fault_create_debugfs_attr+0x180/0x180 [ 1208.276156][T24809] ? ___might_sleep+0x163/0x280 [ 1208.276175][T24809] __should_failslab+0x121/0x190 [ 1208.276192][T24809] should_failslab+0x9/0x14 [ 1208.276210][T24809] __kmalloc+0x2e0/0x770 [ 1208.300480][T24809] ? mark_held_locks+0xf0/0xf0 [ 1208.305280][T24809] ? kasan_slab_alloc+0xf/0x20 [ 1208.310051][T24809] ? kmem_cache_alloc+0x121/0x710 [ 1208.315082][T24809] ? getname_flags+0xd6/0x5b0 [ 1208.319773][T24809] ? getname+0x1a/0x20 [ 1208.323927][T24809] ? do_sys_open+0x2c9/0x5d0 [ 1208.328520][T24809] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1208.334246][T24809] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1208.339790][T24809] ? tomoyo_path_number_perm+0x193/0x520 [ 1208.345462][T24809] tomoyo_path_number_perm+0x1dd/0x520 [ 1208.350922][T24809] ? tomoyo_path_number_perm+0x193/0x520 [ 1208.356559][T24809] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1208.362365][T24809] ? __kasan_check_read+0x11/0x20 [ 1208.367423][T24809] ? __kasan_check_read+0x11/0x20 [ 1208.372461][T24809] ? __fget+0x384/0x560 [ 1208.376623][T24809] ? ksys_dup3+0x3e0/0x3e0 [ 1208.381038][T24809] ? do_sys_open+0x31d/0x5d0 [ 1208.385632][T24809] tomoyo_file_ioctl+0x23/0x30 [ 1208.390408][T24809] security_file_ioctl+0x77/0xc0 [ 1208.395350][T24809] ksys_ioctl+0x57/0xd0 [ 1208.399509][T24809] __x64_sys_ioctl+0x73/0xb0 [ 1208.404106][T24809] do_syscall_64+0xfa/0x760 [ 1208.408621][T24809] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1208.414522][T24809] RIP: 0033:0x459697 [ 1208.418418][T24809] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1208.438025][T24809] RSP: 002b:00007fb3c4759a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1208.446435][T24809] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1208.454405][T24809] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1208.462369][T24809] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1208.470463][T24809] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1208.478462][T24809] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:32:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hf/\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1208.517583][T24809] ERROR: Out of memory at tomoyo_realpath_from_path. 07:32:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hf-\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hf\\\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:01 executing program 5 (fault-call:2 fault-nth:13): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:32:01 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000040)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x40000, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)) ioctl$SCSI_IOCTL_START_UNIT(r2, 0x5) r3 = syz_open_pts(r2, 0x0) dup3(r3, r2, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x1f) ppoll(&(0x7f00000001c0)=[{r3}, {r2}], 0x2, 0x0, 0x0, 0x0) 07:32:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hf0\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1208.836943][T24841] FAULT_INJECTION: forcing a failure. [ 1208.836943][T24841] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1208.850177][T24841] CPU: 0 PID: 24841 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1208.859281][T24841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1208.869339][T24841] Call Trace: [ 1208.872646][T24841] dump_stack+0x172/0x1f0 [ 1208.876989][T24841] should_fail.cold+0xa/0x15 [ 1208.881655][T24841] ? fault_create_debugfs_attr+0x180/0x180 [ 1208.887500][T24841] should_fail_alloc_page+0x50/0x60 [ 1208.892701][T24841] __alloc_pages_nodemask+0x1a1/0x900 [ 1208.898083][T24841] ? lock_downgrade+0x920/0x920 [ 1208.902937][T24841] ? __alloc_pages_slowpath+0x2530/0x2530 [ 1208.908663][T24841] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1208.914390][T24841] ? fault_create_debugfs_attr+0x180/0x180 [ 1208.920203][T24841] cache_grow_begin+0x90/0xd20 [ 1208.925181][T24841] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1208.930909][T24841] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1208.937162][T24841] __kmalloc+0x6b2/0x770 [ 1208.941415][T24841] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1208.947140][T24841] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1208.952691][T24841] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1208.958939][T24841] tomoyo_check_open_permission+0x2a8/0x3f0 [ 1208.964838][T24841] ? tomoyo_path_number_perm+0x520/0x520 [ 1208.970489][T24841] ? lock_downgrade+0x920/0x920 [ 1208.975339][T24841] ? rwlock_bug.part.0+0x90/0x90 [ 1208.980275][T24841] ? lockref_get+0x16/0x60 [ 1208.984698][T24841] tomoyo_file_open+0xa9/0xd0 [ 1208.989398][T24841] security_file_open+0x71/0x300 [ 1208.994351][T24841] do_dentry_open+0x373/0x1250 [ 1208.999118][T24841] ? match_exception_partial+0x242/0x2d0 [ 1209.004763][T24841] ? chown_common+0x5c0/0x5c0 [ 1209.009458][T24841] ? inode_permission+0xb4/0x560 [ 1209.014400][T24841] vfs_open+0xa0/0xd0 [ 1209.018389][T24841] path_openat+0x10e9/0x4630 [ 1209.022982][T24841] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1209.028788][T24841] ? kasan_slab_alloc+0xf/0x20 07:32:02 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3, 0x282) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000040)=0x200000, 0x4) r3 = syz_open_pts(r1, 0x0) dup3(r3, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r3}, {r1}], 0x2, 0x0, 0x0, 0x0) [ 1209.033550][T24841] ? kmem_cache_alloc+0x121/0x710 [ 1209.038660][T24841] ? getname_flags+0xd6/0x5b0 [ 1209.043336][T24841] ? getname+0x1a/0x20 [ 1209.047400][T24841] ? do_sys_open+0x2c9/0x5d0 [ 1209.052008][T24841] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1209.057387][T24841] ? __alloc_pages_nodemask+0x578/0x900 [ 1209.062940][T24841] ? cache_grow_end+0xa4/0x190 [ 1209.067708][T24841] ? __kasan_check_read+0x11/0x20 [ 1209.072751][T24841] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1209.078476][T24841] do_filp_open+0x1a1/0x280 [ 1209.082985][T24841] ? may_open_dev+0x100/0x100 [ 1209.087668][T24841] ? __kasan_check_read+0x11/0x20 [ 1209.092695][T24841] ? do_raw_spin_unlock+0x57/0x270 [ 1209.097812][T24841] ? _raw_spin_unlock+0x2d/0x50 [ 1209.102662][T24841] ? __alloc_fd+0x487/0x620 [ 1209.107170][T24841] do_sys_open+0x3fe/0x5d0 [ 1209.111587][T24841] ? filp_open+0x80/0x80 [ 1209.115926][T24841] ? switch_fpu_return+0x1fa/0x4f0 [ 1209.121041][T24841] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1209.127113][T24841] __x64_sys_open+0x7e/0xc0 [ 1209.131623][T24841] do_syscall_64+0xfa/0x760 [ 1209.136131][T24841] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1209.142020][T24841] RIP: 0033:0x413711 [ 1209.145918][T24841] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1209.165521][T24841] RSP: 002b:00007fb3c4759a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1209.173936][T24841] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 1209.181906][T24841] RDX: 00007fb3c4759b0a RSI: 0000000000000002 RDI: 00007fb3c4759b00 [ 1209.189873][T24841] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1209.197845][T24841] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 1209.205815][T24841] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:32:02 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000040)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x40000, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)) ioctl$SCSI_IOCTL_START_UNIT(r2, 0x5) r3 = syz_open_pts(r2, 0x0) dup3(r3, r2, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x1f) ppoll(&(0x7f00000001c0)=[{r3}, {r2}], 0x2, 0x0, 0x0, 0x0) 07:32:02 executing program 5 (fault-call:2 fault-nth:14): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:32:02 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r0, 0x80000) ppoll(&(0x7f0000000000)=[{r2, 0x10}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:32:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hf.\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1209.462182][T24968] FAULT_INJECTION: forcing a failure. [ 1209.462182][T24968] name failslab, interval 1, probability 0, space 0, times 0 [ 1209.483216][T24968] CPU: 1 PID: 24968 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1209.492345][T24968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1209.492351][T24968] Call Trace: [ 1209.492375][T24968] dump_stack+0x172/0x1f0 [ 1209.492397][T24968] should_fail.cold+0xa/0x15 [ 1209.492416][T24968] ? fault_create_debugfs_attr+0x180/0x180 [ 1209.492442][T24968] ? ___might_sleep+0x163/0x280 [ 1209.520437][T24968] __should_failslab+0x121/0x190 [ 1209.530197][T24968] should_failslab+0x9/0x14 [ 1209.534704][T24968] __kmalloc+0x2e0/0x770 [ 1209.538954][T24968] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1209.545988][T24968] ? d_absolute_path+0x11b/0x170 [ 1209.551040][T24968] ? __d_path+0x140/0x140 [ 1209.555377][T24968] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1209.560755][T24968] tomoyo_encode2.part.0+0xf5/0x400 [ 1209.566139][T24968] tomoyo_encode+0x2b/0x50 [ 1209.570555][T24968] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 1209.576188][T24968] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1209.582468][T24968] tomoyo_check_open_permission+0x2a8/0x3f0 [ 1209.588368][T24968] ? tomoyo_path_number_perm+0x520/0x520 [ 1209.594027][T24968] ? lock_downgrade+0x920/0x920 [ 1209.598881][T24968] ? rwlock_bug.part.0+0x90/0x90 [ 1209.603824][T24968] ? lockref_get+0x16/0x60 [ 1209.608288][T24968] tomoyo_file_open+0xa9/0xd0 [ 1209.613065][T24968] security_file_open+0x71/0x300 [ 1209.618012][T24968] do_dentry_open+0x373/0x1250 [ 1209.622835][T24968] ? match_exception_partial+0x242/0x2d0 [ 1209.628479][T24968] ? chown_common+0x5c0/0x5c0 [ 1209.633157][T24968] ? inode_permission+0xb4/0x560 [ 1209.638104][T24968] vfs_open+0xa0/0xd0 [ 1209.642095][T24968] path_openat+0x10e9/0x4630 [ 1209.646687][T24968] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1209.652579][T24968] ? kasan_slab_alloc+0xf/0x20 [ 1209.657348][T24968] ? kmem_cache_alloc+0x121/0x710 [ 1209.662382][T24968] ? getname_flags+0xd6/0x5b0 [ 1209.667057][T24968] ? getname+0x1a/0x20 [ 1209.671143][T24968] ? do_sys_open+0x2c9/0x5d0 [ 1209.675830][T24968] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1209.681197][T24968] ? __alloc_pages_nodemask+0x578/0x900 [ 1209.686743][T24968] ? cache_grow_end+0xa4/0x190 [ 1209.691507][T24968] ? __kasan_check_read+0x11/0x20 [ 1209.696530][T24968] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1209.702260][T24968] do_filp_open+0x1a1/0x280 [ 1209.706766][T24968] ? may_open_dev+0x100/0x100 [ 1209.711456][T24968] ? __kasan_check_read+0x11/0x20 [ 1209.716566][T24968] ? do_raw_spin_unlock+0x57/0x270 [ 1209.721677][T24968] ? _raw_spin_unlock+0x2d/0x50 [ 1209.726548][T24968] ? __alloc_fd+0x487/0x620 [ 1209.731060][T24968] do_sys_open+0x3fe/0x5d0 [ 1209.735566][T24968] ? filp_open+0x80/0x80 [ 1209.739812][T24968] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1209.746055][T24968] ? fput+0x1b/0x20 [ 1209.749866][T24968] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1209.755935][T24968] __x64_sys_open+0x7e/0xc0 [ 1209.760440][T24968] do_syscall_64+0xfa/0x760 [ 1209.764949][T24968] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1209.770839][T24968] RIP: 0033:0x413711 [ 1209.774734][T24968] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1209.794795][T24968] RSP: 002b:00007fb3c4759a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1209.803206][T24968] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 07:32:02 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000040)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x40000, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)) ioctl$SCSI_IOCTL_START_UNIT(r2, 0x5) r3 = syz_open_pts(r2, 0x0) dup3(r3, r2, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x1f) ppoll(&(0x7f00000001c0)=[{r3}, {r2}], 0x2, 0x0, 0x0, 0x0) [ 1209.811178][T24968] RDX: 00007fb3c4759b0a RSI: 0000000000000002 RDI: 00007fb3c4759b00 [ 1209.819149][T24968] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1209.827139][T24968] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 1209.835113][T24968] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 [ 1209.853404][T24968] ERROR: Out of memory at tomoyo_realpath_from_path. 07:32:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfc\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfX\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:03 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000040)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x40000, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)) ioctl$SCSI_IOCTL_START_UNIT(r2, 0x5) r3 = syz_open_pts(r2, 0x0) dup3(r3, r2, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x1f) 07:32:03 executing program 5 (fault-call:2 fault-nth:15): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:32:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hf/\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:03 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000040)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x40000, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)) ioctl$SCSI_IOCTL_START_UNIT(r2, 0x5) syz_open_pts(r2, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x1f) [ 1210.139590][T24989] FAULT_INJECTION: forcing a failure. [ 1210.139590][T24989] name failslab, interval 1, probability 0, space 0, times 0 [ 1210.156519][T24989] CPU: 0 PID: 24989 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1210.165644][T24989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1210.175702][T24989] Call Trace: [ 1210.179028][T24989] dump_stack+0x172/0x1f0 [ 1210.183371][T24989] should_fail.cold+0xa/0x15 [ 1210.187975][T24989] ? fault_create_debugfs_attr+0x180/0x180 [ 1210.193789][T24989] ? ___might_sleep+0x163/0x280 [ 1210.198652][T24989] __should_failslab+0x121/0x190 [ 1210.203614][T24989] should_failslab+0x9/0x14 [ 1210.208125][T24989] __kmalloc+0x2e0/0x770 [ 1210.212372][T24989] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1210.218619][T24989] ? d_absolute_path+0x11b/0x170 [ 1210.223557][T24989] ? __d_path+0x140/0x140 [ 1210.227883][T24989] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1210.233258][T24989] tomoyo_encode2.part.0+0xf5/0x400 07:32:03 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000000)={0x2, 0x1000, 0x5, 0x0, 0x16, 0x597, 0x5, 0x0, 0xe489, 0x100}) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) [ 1210.238467][T24989] tomoyo_encode+0x2b/0x50 [ 1210.242888][T24989] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 1210.248527][T24989] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1210.254782][T24989] tomoyo_check_open_permission+0x2a8/0x3f0 [ 1210.260689][T24989] ? tomoyo_path_number_perm+0x520/0x520 [ 1210.266349][T24989] ? lock_downgrade+0x920/0x920 [ 1210.271203][T24989] ? rwlock_bug.part.0+0x90/0x90 [ 1210.276145][T24989] ? lockref_get+0x16/0x60 [ 1210.280567][T24989] tomoyo_file_open+0xa9/0xd0 [ 1210.285250][T24989] security_file_open+0x71/0x300 [ 1210.290200][T24989] do_dentry_open+0x373/0x1250 [ 1210.294967][T24989] ? match_exception_partial+0x242/0x2d0 [ 1210.300610][T24989] ? chown_common+0x5c0/0x5c0 [ 1210.305296][T24989] ? inode_permission+0xb4/0x560 [ 1210.310242][T24989] vfs_open+0xa0/0xd0 [ 1210.314234][T24989] path_openat+0x10e9/0x4630 [ 1210.318834][T24989] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1210.324734][T24989] ? kasan_slab_alloc+0xf/0x20 [ 1210.329502][T24989] ? kmem_cache_alloc+0x121/0x710 [ 1210.334529][T24989] ? getname_flags+0xd6/0x5b0 [ 1210.339206][T24989] ? getname+0x1a/0x20 [ 1210.343276][T24989] ? do_sys_open+0x2c9/0x5d0 [ 1210.347877][T24989] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1210.353247][T24989] ? __alloc_pages_nodemask+0x578/0x900 [ 1210.358812][T24989] ? cache_grow_end+0xa4/0x190 [ 1210.363573][T24989] ? __kasan_check_read+0x11/0x20 [ 1210.368605][T24989] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1210.374331][T24989] do_filp_open+0x1a1/0x280 [ 1210.378836][T24989] ? may_open_dev+0x100/0x100 [ 1210.383522][T24989] ? __kasan_check_read+0x11/0x20 [ 1210.388546][T24989] ? do_raw_spin_unlock+0x57/0x270 [ 1210.393662][T24989] ? _raw_spin_unlock+0x2d/0x50 [ 1210.398517][T24989] ? __alloc_fd+0x487/0x620 [ 1210.403028][T24989] do_sys_open+0x3fe/0x5d0 [ 1210.407451][T24989] ? filp_open+0x80/0x80 [ 1210.411694][T24989] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1210.418107][T24989] ? fput+0x1b/0x20 [ 1210.421920][T24989] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1210.427986][T24989] __x64_sys_open+0x7e/0xc0 [ 1210.432664][T24989] do_syscall_64+0xfa/0x760 [ 1210.437176][T24989] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1210.443097][T24989] RIP: 0033:0x413711 [ 1210.447001][T24989] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1210.466605][T24989] RSP: 002b:00007fb3c4759a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1210.475021][T24989] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 1210.483022][T24989] RDX: 00007fb3c4759b0a RSI: 0000000000000002 RDI: 00007fb3c4759b00 [ 1210.490997][T24989] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1210.498973][T24989] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 1210.506948][T24989] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:32:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfd\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) [ 1210.536483][T24989] ERROR: Out of memory at tomoyo_realpath_from_path. 07:32:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hf\\\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:03 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000040)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x40000, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)) ioctl$SCSI_IOCTL_START_UNIT(r2, 0x5) prctl$PR_CAPBSET_DROP(0x18, 0x1f) 07:32:03 executing program 5 (fault-call:2 fault-nth:16): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:32:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hf0\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:03 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r3 = syz_open_pts(r1, 0x0) dup3(r3, r1, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x400000, 0x0) ppoll(&(0x7f00000001c0)=[{r3}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:32:03 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000040)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x40000, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)) prctl$PR_CAPBSET_DROP(0x18, 0x1f) [ 1210.833595][T25213] FAULT_INJECTION: forcing a failure. [ 1210.833595][T25213] name failslab, interval 1, probability 0, space 0, times 0 [ 1210.862099][T25213] CPU: 0 PID: 25213 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1210.871683][T25213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1210.881750][T25213] Call Trace: [ 1210.885053][T25213] dump_stack+0x172/0x1f0 [ 1210.889397][T25213] should_fail.cold+0xa/0x15 [ 1210.893995][T25213] ? blkdev_ioctl+0xedb/0x1c1a [ 1210.898941][T25213] ? fault_create_debugfs_attr+0x180/0x180 [ 1210.904769][T25213] ? page_to_nid.part.0+0x20/0x20 [ 1210.909800][T25213] ? ___might_sleep+0x163/0x280 [ 1210.914661][T25213] __should_failslab+0x121/0x190 [ 1210.919602][T25213] should_failslab+0x9/0x14 [ 1210.924107][T25213] kmem_cache_alloc+0x2aa/0x710 [ 1210.928983][T25213] ? debug_check_no_obj_freed+0xc0/0x43f [ 1210.934622][T25213] __kernfs_new_node+0xf0/0x6c0 [ 1210.939476][T25213] ? __kasan_check_read+0x11/0x20 [ 1210.944517][T25213] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1210.950027][T25213] ? __enqueue_entity+0x142/0x390 [ 1210.955062][T25213] kernfs_new_node+0x96/0x120 [ 1210.959754][T25213] kernfs_create_dir_ns+0x52/0x160 [ 1210.964880][T25213] internal_create_group+0x7f4/0xc30 [ 1210.970168][T25213] ? bd_set_size+0x3f/0xb0 [ 1210.974589][T25213] ? lock_downgrade+0x920/0x920 [ 1210.979449][T25213] ? remove_files.isra.0+0x190/0x190 [ 1210.984749][T25213] ? __kasan_check_write+0x14/0x20 [ 1210.989859][T25213] ? up_write+0x155/0x490 [ 1210.994189][T25213] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1211.000433][T25213] sysfs_create_group+0x20/0x30 [ 1211.005307][T25213] loop_set_fd+0xac1/0x1020 [ 1211.009849][T25213] lo_ioctl+0x1a3/0x1460 [ 1211.014104][T25213] ? trace_hardirqs_on+0x67/0x240 [ 1211.019128][T25213] ? loop_set_fd+0x1020/0x1020 [ 1211.023897][T25213] blkdev_ioctl+0xedb/0x1c1a [ 1211.028488][T25213] ? blkpg_ioctl+0xa90/0xa90 [ 1211.033084][T25213] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1211.038912][T25213] ? __kasan_check_read+0x11/0x20 [ 1211.043944][T25213] ? __kasan_check_read+0x11/0x20 [ 1211.048975][T25213] block_ioctl+0xee/0x130 [ 1211.053310][T25213] ? blkdev_fallocate+0x410/0x410 [ 1211.058336][T25213] do_vfs_ioctl+0xdb6/0x13e0 [ 1211.062935][T25213] ? ioctl_preallocate+0x210/0x210 [ 1211.068045][T25213] ? __fget+0x384/0x560 [ 1211.072205][T25213] ? ksys_dup3+0x3e0/0x3e0 [ 1211.076623][T25213] ? do_sys_open+0x31d/0x5d0 [ 1211.081219][T25213] ? tomoyo_file_ioctl+0x23/0x30 [ 1211.086503][T25213] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1211.092751][T25213] ? security_file_ioctl+0x8d/0xc0 [ 1211.097868][T25213] ksys_ioctl+0xab/0xd0 [ 1211.102033][T25213] __x64_sys_ioctl+0x73/0xb0 [ 1211.106626][T25213] do_syscall_64+0xfa/0x760 [ 1211.111150][T25213] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1211.117049][T25213] RIP: 0033:0x459697 [ 1211.120943][T25213] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1211.140546][T25213] RSP: 002b:00007fb3c4759a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1211.148972][T25213] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1211.157089][T25213] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1211.165070][T25213] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1211.173043][T25213] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 07:32:04 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) fsync(r1) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) [ 1211.181014][T25213] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:32:04 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000040)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x40000, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x1f) 07:32:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfi\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:04 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ftruncate(r0, 0x6) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)) r3 = syz_open_pts(r2, 0x0) dup3(r3, r2, 0x0) ppoll(&(0x7f00000001c0)=[{r3}, {r2}], 0x2, 0x0, 0x0, 0x0) 07:32:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfc\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:04 executing program 5 (fault-call:2 fault-nth:17): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:32:04 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000040)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x1f) 07:32:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfX\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:04 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000040)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) prctl$PR_CAPBSET_DROP(0x18, 0x1f) 07:32:04 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) [ 1211.512483][T25442] FAULT_INJECTION: forcing a failure. [ 1211.512483][T25442] name failslab, interval 1, probability 0, space 0, times 0 [ 1211.552425][T25442] CPU: 0 PID: 25442 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1211.561574][T25442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1211.571635][T25442] Call Trace: [ 1211.574945][T25442] dump_stack+0x172/0x1f0 [ 1211.579323][T25442] should_fail.cold+0xa/0x15 [ 1211.583919][T25442] ? fault_create_debugfs_attr+0x180/0x180 [ 1211.589730][T25442] ? page_to_nid.part.0+0x20/0x20 [ 1211.594764][T25442] ? ___might_sleep+0x163/0x280 [ 1211.599620][T25442] __should_failslab+0x121/0x190 [ 1211.604561][T25442] should_failslab+0x9/0x14 [ 1211.609061][T25442] kmem_cache_alloc+0x2aa/0x710 [ 1211.613913][T25442] ? kernfs_activate+0x192/0x1f0 [ 1211.618857][T25442] ? __kasan_check_read+0x11/0x20 [ 1211.623979][T25442] ? __mutex_lock+0x45d/0x13c0 [ 1211.628765][T25442] __kernfs_new_node+0xf0/0x6c0 [ 1211.633626][T25442] ? __mutex_lock+0x45d/0x13c0 [ 1211.638397][T25442] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1211.643879][T25442] ? __kasan_check_write+0x14/0x20 [ 1211.649005][T25442] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1211.654580][T25442] ? wait_for_completion+0x440/0x440 [ 1211.659884][T25442] kernfs_new_node+0x96/0x120 [ 1211.664572][T25442] __kernfs_create_file+0x51/0x33b [ 1211.669691][T25442] sysfs_add_file_mode_ns+0x222/0x560 [ 1211.675075][T25442] internal_create_group+0x359/0xc30 [ 1211.680367][T25442] ? bd_set_size+0x3f/0xb0 [ 1211.684805][T25442] ? remove_files.isra.0+0x190/0x190 [ 1211.690093][T25442] ? __kasan_check_write+0x14/0x20 [ 1211.695209][T25442] ? up_write+0x155/0x490 [ 1211.699543][T25442] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1211.705794][T25442] sysfs_create_group+0x20/0x30 [ 1211.710652][T25442] loop_set_fd+0xac1/0x1020 [ 1211.715166][T25442] lo_ioctl+0x1a3/0x1460 [ 1211.719443][T25442] ? trace_hardirqs_on+0x67/0x240 [ 1211.724480][T25442] ? loop_set_fd+0x1020/0x1020 [ 1211.729255][T25442] blkdev_ioctl+0xedb/0x1c1a [ 1211.733875][T25442] ? blkpg_ioctl+0xa90/0xa90 [ 1211.738467][T25442] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1211.744272][T25442] ? __kasan_check_read+0x11/0x20 [ 1211.749306][T25442] ? __kasan_check_read+0x11/0x20 [ 1211.754340][T25442] block_ioctl+0xee/0x130 [ 1211.758673][T25442] ? blkdev_fallocate+0x410/0x410 [ 1211.763699][T25442] do_vfs_ioctl+0xdb6/0x13e0 [ 1211.768465][T25442] ? ioctl_preallocate+0x210/0x210 [ 1211.773582][T25442] ? __fget+0x384/0x560 [ 1211.777752][T25442] ? ksys_dup3+0x3e0/0x3e0 [ 1211.782172][T25442] ? do_sys_open+0x31d/0x5d0 [ 1211.786791][T25442] ? tomoyo_file_ioctl+0x23/0x30 [ 1211.791736][T25442] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1211.797998][T25442] ? security_file_ioctl+0x8d/0xc0 [ 1211.803115][T25442] ksys_ioctl+0xab/0xd0 [ 1211.807280][T25442] __x64_sys_ioctl+0x73/0xb0 [ 1211.811874][T25442] do_syscall_64+0xfa/0x760 [ 1211.816401][T25442] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1211.822291][T25442] RIP: 0033:0x459697 [ 1211.826194][T25442] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1211.845801][T25442] RSP: 002b:00007fb3c4759a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1211.854232][T25442] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1211.862224][T25442] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1211.870202][T25442] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1211.878175][T25442] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1211.886149][T25442] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:32:05 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000040)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) prctl$PR_CAPBSET_DROP(0x18, 0x1f) 07:32:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfl\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:05 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x3f, 0x80000) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x20000, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200800, 0x0) syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x7ff, 0x400) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x20180, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x40000, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x40000, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x80000002) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x2000, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000040)={0x5, 0xc8}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000380)=0x80000) r3 = syz_open_pts(r2, 0x0) dup3(r3, r2, 0x0) ppoll(&(0x7f00000003c0), 0x0, 0x0, 0x0, 0x0) 07:32:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfd\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:05 executing program 5 (fault-call:2 fault-nth:18): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:32:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hf\\\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:05 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000040)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) prctl$PR_CAPBSET_DROP(0x18, 0x1f) 07:32:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfo\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) [ 1212.342835][T25676] FAULT_INJECTION: forcing a failure. [ 1212.342835][T25676] name failslab, interval 1, probability 0, space 0, times 0 [ 1212.372126][T25676] CPU: 0 PID: 25676 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1212.381264][T25676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1212.391322][T25676] Call Trace: [ 1212.394622][T25676] dump_stack+0x172/0x1f0 [ 1212.398963][T25676] should_fail.cold+0xa/0x15 [ 1212.403564][T25676] ? fault_create_debugfs_attr+0x180/0x180 [ 1212.409376][T25676] ? page_to_nid.part.0+0x20/0x20 [ 1212.414405][T25676] ? ___might_sleep+0x163/0x280 [ 1212.419262][T25676] __should_failslab+0x121/0x190 [ 1212.424203][T25676] should_failslab+0x9/0x14 [ 1212.428705][T25676] kmem_cache_alloc+0x2aa/0x710 [ 1212.433560][T25676] ? __mutex_lock+0x45d/0x13c0 [ 1212.438332][T25676] __kernfs_new_node+0xf0/0x6c0 [ 1212.443213][T25676] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1212.448690][T25676] ? wait_for_completion+0x440/0x440 [ 1212.453982][T25676] ? __kasan_check_write+0x14/0x20 [ 1212.459096][T25676] ? mutex_unlock+0xd/0x10 [ 1212.463548][T25676] ? kernfs_activate+0x192/0x1f0 [ 1212.468490][T25676] kernfs_new_node+0x96/0x120 [ 1212.473172][T25676] __kernfs_create_file+0x51/0x33b [ 1212.478289][T25676] sysfs_add_file_mode_ns+0x222/0x560 [ 1212.483672][T25676] internal_create_group+0x359/0xc30 [ 1212.488957][T25676] ? bd_set_size+0x3f/0xb0 [ 1212.493381][T25676] ? remove_files.isra.0+0x190/0x190 [ 1212.498668][T25676] ? __kasan_check_write+0x14/0x20 [ 1212.503780][T25676] ? up_write+0x155/0x490 [ 1212.508115][T25676] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1212.514754][T25676] sysfs_create_group+0x20/0x30 [ 1212.522219][T25676] loop_set_fd+0xac1/0x1020 [ 1212.526813][T25676] lo_ioctl+0x1a3/0x1460 [ 1212.531073][T25676] ? trace_hardirqs_on+0x67/0x240 [ 1212.536104][T25676] ? loop_set_fd+0x1020/0x1020 [ 1212.540871][T25676] blkdev_ioctl+0xedb/0x1c1a [ 1212.545553][T25676] ? blkpg_ioctl+0xa90/0xa90 [ 1212.550146][T25676] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1212.555955][T25676] ? __kasan_check_read+0x11/0x20 [ 1212.560988][T25676] ? __kasan_check_read+0x11/0x20 [ 1212.566016][T25676] block_ioctl+0xee/0x130 [ 1212.570350][T25676] ? blkdev_fallocate+0x410/0x410 [ 1212.575374][T25676] do_vfs_ioctl+0xdb6/0x13e0 [ 1212.579972][T25676] ? ioctl_preallocate+0x210/0x210 [ 1212.585082][T25676] ? __fget+0x384/0x560 [ 1212.589238][T25676] ? ksys_dup3+0x3e0/0x3e0 [ 1212.593649][T25676] ? do_sys_open+0x31d/0x5d0 [ 1212.598243][T25676] ? tomoyo_file_ioctl+0x23/0x30 [ 1212.603184][T25676] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1212.609423][T25676] ? security_file_ioctl+0x8d/0xc0 [ 1212.614535][T25676] ksys_ioctl+0xab/0xd0 [ 1212.618697][T25676] __x64_sys_ioctl+0x73/0xb0 [ 1212.623287][T25676] do_syscall_64+0xfa/0x760 [ 1212.627801][T25676] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1212.633690][T25676] RIP: 0033:0x459697 [ 1212.637586][T25676] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1212.658062][T25676] RSP: 002b:00007fb3c4759a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1212.666475][T25676] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1212.675754][T25676] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1212.683723][T25676] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1212.691784][T25676] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1212.699758][T25676] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:32:05 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000040)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x1f) 07:32:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfc\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:05 executing program 5 (fault-call:2 fault-nth:19): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:32:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfi\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:06 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000040)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x1f) 07:32:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfp\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:06 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7, 0x2000) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x656a}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={r2, 0x7}, &(0x7f0000000200)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000140)) r4 = syz_open_pts(r3, 0x0) dup3(r4, r3, 0x0) ppoll(&(0x7f00000001c0)=[{r4}, {r3}], 0x2, 0x0, 0x0, 0x0) [ 1213.076459][T25756] FAULT_INJECTION: forcing a failure. [ 1213.076459][T25756] name failslab, interval 1, probability 0, space 0, times 0 [ 1213.089262][T25756] CPU: 1 PID: 25756 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1213.098371][T25756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1213.108428][T25756] Call Trace: [ 1213.111725][T25756] dump_stack+0x172/0x1f0 [ 1213.116062][T25756] should_fail.cold+0xa/0x15 [ 1213.120660][T25756] ? fault_create_debugfs_attr+0x180/0x180 [ 1213.126484][T25756] ? page_to_nid.part.0+0x20/0x20 [ 1213.131510][T25756] ? ___might_sleep+0x163/0x280 [ 1213.136374][T25756] __should_failslab+0x121/0x190 [ 1213.141340][T25756] should_failslab+0x9/0x14 [ 1213.145845][T25756] kmem_cache_alloc+0x2aa/0x710 [ 1213.150703][T25756] __kernfs_new_node+0xf0/0x6c0 [ 1213.155559][T25756] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1213.161026][T25756] ? _raw_spin_unlock_irq+0x5e/0x90 [ 1213.166225][T25756] ? __schedule+0x10ba/0x17d0 [ 1213.170914][T25756] ? __sched_text_start+0x8/0x8 [ 1213.175767][T25756] kernfs_new_node+0x96/0x120 [ 1213.180449][T25756] kernfs_create_dir_ns+0x52/0x160 [ 1213.185561][T25756] internal_create_group+0x7f4/0xc30 [ 1213.190841][T25756] ? bd_set_size+0x3f/0xb0 [ 1213.195265][T25756] ? lock_downgrade+0x920/0x920 [ 1213.200115][T25756] ? remove_files.isra.0+0x190/0x190 [ 1213.205404][T25756] ? __kasan_check_write+0x14/0x20 [ 1213.210513][T25756] ? up_write+0x155/0x490 [ 1213.214846][T25756] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1213.221089][T25756] sysfs_create_group+0x20/0x30 [ 1213.225941][T25756] loop_set_fd+0xac1/0x1020 [ 1213.230447][T25756] lo_ioctl+0x1a3/0x1460 [ 1213.234694][T25756] ? trace_hardirqs_on+0x67/0x240 [ 1213.239719][T25756] ? loop_set_fd+0x1020/0x1020 [ 1213.244477][T25756] blkdev_ioctl+0xedb/0x1c1a [ 1213.249069][T25756] ? blkpg_ioctl+0xa90/0xa90 [ 1213.253667][T25756] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1213.259469][T25756] ? __kasan_check_read+0x11/0x20 [ 1213.264502][T25756] ? __kasan_check_read+0x11/0x20 [ 1213.269534][T25756] block_ioctl+0xee/0x130 [ 1213.273863][T25756] ? blkdev_fallocate+0x410/0x410 [ 1213.278885][T25756] do_vfs_ioctl+0xdb6/0x13e0 [ 1213.283479][T25756] ? ioctl_preallocate+0x210/0x210 [ 1213.288589][T25756] ? __fget+0x384/0x560 [ 1213.292749][T25756] ? ksys_dup3+0x3e0/0x3e0 [ 1213.297178][T25756] ? do_sys_open+0x31d/0x5d0 [ 1213.301766][T25756] ? tomoyo_file_ioctl+0x23/0x30 [ 1213.306708][T25756] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1213.312950][T25756] ? security_file_ioctl+0x8d/0xc0 [ 1213.318066][T25756] ksys_ioctl+0xab/0xd0 [ 1213.322220][T25756] __x64_sys_ioctl+0x73/0xb0 [ 1213.326821][T25756] do_syscall_64+0xfa/0x760 [ 1213.331332][T25756] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1213.337219][T25756] RIP: 0033:0x459697 [ 1213.341116][T25756] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1213.360814][T25756] RSP: 002b:00007fb3c4759a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1213.369221][T25756] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 07:32:06 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000040)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x1f) 07:32:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfd\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1213.377368][T25756] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1213.385346][T25756] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1213.393312][T25756] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1213.401280][T25756] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:32:06 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x65, &(0x7f0000000240)=[@in6={0xa, 0x4e22, 0x9, @mcast2, 0xa02}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e20, 0x1f, @mcast2, 0x49e9c5a7}, @in6={0xa, 0x4e24, 0x3ff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8}, @in={0x2, 0x4e21, @rand_addr=0xba}, @in6={0xa, 0x4e24, 0xffffffff7fffffff, @loopback, 0x6}, @in6={0xa, 0x4e24, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x101}], 0xac) ioctl$int_in(r2, 0x5452, &(0x7f0000000040)=0x3) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)) r4 = syz_open_pts(r2, 0x0) r5 = dup3(r4, r2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f00000001c0)={0x0, 0x1, 0x1000, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) ppoll(&(0x7f0000000100)=[{r4}, {r2, 0x2}], 0x2, 0x0, 0x0, 0x0) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r5, 0x40405514, &(0x7f00000000c0)={0x8, 0x3, 0x6, 0x8, 'syz1\x00', 0xffffffffffffffff}) signalfd4(r0, &(0x7f0000000000)={0x1}, 0x8, 0x80800) 07:32:06 executing program 5 (fault-call:2 fault-nth:20): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:32:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfl\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:06 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x1f) 07:32:06 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r0) ioctl$KVM_GET_NR_MMU_PAGES(r2, 0xae45, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget(0x0, 0x3, 0x4c) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000140)) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000180)=0xc39) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x200, 0x0) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000040)) ioctl$EVIOCGKEYCODE(r4, 0x80084504, &(0x7f00000000c0)=""/111) r5 = syz_open_pts(r3, 0x0) dup3(r5, r3, 0x0) ppoll(&(0x7f00000001c0)=[{r5}, {r3}], 0x2, 0x0, 0x0, 0x0) [ 1213.742271][T25841] FAULT_INJECTION: forcing a failure. [ 1213.742271][T25841] name failslab, interval 1, probability 0, space 0, times 0 [ 1213.764943][T25841] CPU: 1 PID: 25841 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1213.774077][T25841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1213.784135][T25841] Call Trace: [ 1213.787436][T25841] dump_stack+0x172/0x1f0 [ 1213.791776][T25841] should_fail.cold+0xa/0x15 [ 1213.796375][T25841] ? fault_create_debugfs_attr+0x180/0x180 [ 1213.802186][T25841] ? page_to_nid.part.0+0x20/0x20 [ 1213.807212][T25841] ? ___might_sleep+0x163/0x280 [ 1213.812068][T25841] __should_failslab+0x121/0x190 [ 1213.817009][T25841] should_failslab+0x9/0x14 [ 1213.821511][T25841] kmem_cache_alloc+0x2aa/0x710 [ 1213.826365][T25841] ? kernfs_activate+0x192/0x1f0 [ 1213.831303][T25841] ? __kasan_check_read+0x11/0x20 [ 1213.836355][T25841] ? __mutex_lock+0x45d/0x13c0 [ 1213.841115][T25841] __kernfs_new_node+0xf0/0x6c0 [ 1213.845965][T25841] ? __mutex_lock+0x45d/0x13c0 [ 1213.850735][T25841] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1213.856193][T25841] ? __kasan_check_write+0x14/0x20 [ 1213.861302][T25841] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1213.866855][T25841] ? wait_for_completion+0x440/0x440 [ 1213.872143][T25841] kernfs_new_node+0x96/0x120 [ 1213.876827][T25841] __kernfs_create_file+0x51/0x33b [ 1213.881936][T25841] sysfs_add_file_mode_ns+0x222/0x560 [ 1213.887312][T25841] internal_create_group+0x359/0xc30 [ 1213.892596][T25841] ? bd_set_size+0x3f/0xb0 [ 1213.897022][T25841] ? remove_files.isra.0+0x190/0x190 [ 1213.902308][T25841] ? __kasan_check_write+0x14/0x20 [ 1213.907417][T25841] ? up_write+0x155/0x490 [ 1213.911746][T25841] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1213.917988][T25841] sysfs_create_group+0x20/0x30 [ 1213.922840][T25841] loop_set_fd+0xac1/0x1020 [ 1213.927435][T25841] lo_ioctl+0x1a3/0x1460 [ 1213.931684][T25841] ? trace_hardirqs_on+0x67/0x240 [ 1213.936708][T25841] ? loop_set_fd+0x1020/0x1020 [ 1213.941478][T25841] blkdev_ioctl+0xedb/0x1c1a [ 1213.946079][T25841] ? blkpg_ioctl+0xa90/0xa90 [ 1213.950675][T25841] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1213.956482][T25841] ? __kasan_check_read+0x11/0x20 [ 1213.961512][T25841] ? __kasan_check_read+0x11/0x20 [ 1213.966545][T25841] block_ioctl+0xee/0x130 [ 1213.970877][T25841] ? blkdev_fallocate+0x410/0x410 [ 1213.975904][T25841] do_vfs_ioctl+0xdb6/0x13e0 [ 1213.980492][T25841] ? ioctl_preallocate+0x210/0x210 [ 1213.985606][T25841] ? __fget+0x384/0x560 07:32:07 executing program 3: syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x1f) [ 1213.989762][T25841] ? ksys_dup3+0x3e0/0x3e0 [ 1213.994178][T25841] ? do_sys_open+0x31d/0x5d0 [ 1213.998782][T25841] ? tomoyo_file_ioctl+0x23/0x30 [ 1214.003723][T25841] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1214.009961][T25841] ? security_file_ioctl+0x8d/0xc0 [ 1214.015079][T25841] ksys_ioctl+0xab/0xd0 [ 1214.019240][T25841] __x64_sys_ioctl+0x73/0xb0 [ 1214.023844][T25841] do_syscall_64+0xfa/0x760 [ 1214.028352][T25841] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1214.034246][T25841] RIP: 0033:0x459697 [ 1214.038142][T25841] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1214.057745][T25841] RSP: 002b:00007fb3c4759a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1214.066157][T25841] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1214.074124][T25841] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1214.082088][T25841] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 07:32:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfi\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1214.090061][T25841] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1214.098028][T25841] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:32:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfu\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:07 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x1f) 07:32:07 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0xa413cfcd823b4201, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1ff}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000001cc0)='/dev/null\x00', 0x484080, 0x0) accept4$packet(r2, &(0x7f0000001d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001d40)=0x14, 0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) r3 = syz_open_pts(r1, 0x0) dup3(r3, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r3}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:32:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfo\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:07 executing program 5 (fault-call:2 fault-nth:21): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:32:07 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x1f) 07:32:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfl\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1214.468062][T26064] FAULT_INJECTION: forcing a failure. [ 1214.468062][T26064] name failslab, interval 1, probability 0, space 0, times 0 [ 1214.493390][T26064] CPU: 0 PID: 26064 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1214.502520][T26064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1214.513192][T26064] Call Trace: [ 1214.517874][T26064] dump_stack+0x172/0x1f0 [ 1214.523177][T26064] should_fail.cold+0xa/0x15 [ 1214.527867][T26064] ? fault_create_debugfs_attr+0x180/0x180 [ 1214.533705][T26064] ? page_to_nid.part.0+0x20/0x20 [ 1214.538758][T26064] ? ___might_sleep+0x163/0x280 [ 1214.543621][T26064] __should_failslab+0x121/0x190 [ 1214.548573][T26064] should_failslab+0x9/0x14 [ 1214.553076][T26064] kmem_cache_alloc+0x2aa/0x710 [ 1214.557936][T26064] ? __mutex_lock+0x45d/0x13c0 [ 1214.562712][T26064] __kernfs_new_node+0xf0/0x6c0 [ 1214.567582][T26064] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1214.573047][T26064] ? wait_for_completion+0x440/0x440 [ 1214.578334][T26064] ? __kasan_check_write+0x14/0x20 [ 1214.583446][T26064] ? mutex_unlock+0xd/0x10 [ 1214.587865][T26064] ? kernfs_activate+0x192/0x1f0 [ 1214.592809][T26064] kernfs_new_node+0x96/0x120 [ 1214.597492][T26064] __kernfs_create_file+0x51/0x33b [ 1214.602608][T26064] sysfs_add_file_mode_ns+0x222/0x560 [ 1214.607988][T26064] internal_create_group+0x359/0xc30 [ 1214.613273][T26064] ? bd_set_size+0x3f/0xb0 [ 1214.617696][T26064] ? remove_files.isra.0+0x190/0x190 [ 1214.622988][T26064] ? __kasan_check_write+0x14/0x20 [ 1214.628101][T26064] ? up_write+0x155/0x490 [ 1214.632438][T26064] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1214.638683][T26064] sysfs_create_group+0x20/0x30 [ 1214.643541][T26064] loop_set_fd+0xac1/0x1020 [ 1214.648059][T26064] lo_ioctl+0x1a3/0x1460 [ 1214.652310][T26064] ? trace_hardirqs_on+0x67/0x240 [ 1214.657336][T26064] ? loop_set_fd+0x1020/0x1020 [ 1214.662102][T26064] blkdev_ioctl+0xedb/0x1c1a [ 1214.666698][T26064] ? blkpg_ioctl+0xa90/0xa90 [ 1214.672777][T26064] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1214.678754][T26064] ? __kasan_check_read+0x11/0x20 [ 1214.683793][T26064] ? __kasan_check_read+0x11/0x20 [ 1214.688833][T26064] block_ioctl+0xee/0x130 [ 1214.693175][T26064] ? blkdev_fallocate+0x410/0x410 [ 1214.698220][T26064] do_vfs_ioctl+0xdb6/0x13e0 [ 1214.702828][T26064] ? ioctl_preallocate+0x210/0x210 [ 1214.707943][T26064] ? __fget+0x384/0x560 [ 1214.712122][T26064] ? ksys_dup3+0x3e0/0x3e0 [ 1214.716540][T26064] ? do_sys_open+0x31d/0x5d0 [ 1214.721129][T26064] ? tomoyo_file_ioctl+0x23/0x30 [ 1214.726075][T26064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1214.732322][T26064] ? security_file_ioctl+0x8d/0xc0 [ 1214.737438][T26064] ksys_ioctl+0xab/0xd0 [ 1214.741591][T26064] __x64_sys_ioctl+0x73/0xb0 [ 1214.746189][T26064] do_syscall_64+0xfa/0x760 [ 1214.750708][T26064] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1214.756604][T26064] RIP: 0033:0x459697 [ 1214.760501][T26064] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1214.780103][T26064] RSP: 002b:00007fb3c4759a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1214.788526][T26064] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1214.796499][T26064] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1214.804497][T26064] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 07:32:07 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x1f) [ 1214.812480][T26064] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1214.820454][T26064] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:32:08 executing program 5 (fault-call:2 fault-nth:22): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:32:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfx\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfp\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:08 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x1f) 07:32:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfo\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:08 executing program 3: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x1f) [ 1215.173766][T26127] FAULT_INJECTION: forcing a failure. [ 1215.173766][T26127] name failslab, interval 1, probability 0, space 0, times 0 [ 1215.192166][T26127] CPU: 1 PID: 26127 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1215.201538][T26127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1215.211612][T26127] Call Trace: [ 1215.215075][T26127] dump_stack+0x172/0x1f0 [ 1215.219426][T26127] should_fail.cold+0xa/0x15 [ 1215.224029][T26127] ? fault_create_debugfs_attr+0x180/0x180 [ 1215.230397][T26127] ? page_to_nid.part.0+0x20/0x20 [ 1215.235442][T26127] ? ___might_sleep+0x163/0x280 [ 1215.240418][T26127] __should_failslab+0x121/0x190 [ 1215.245377][T26127] should_failslab+0x9/0x14 [ 1215.249900][T26127] kmem_cache_alloc+0x2aa/0x710 [ 1215.254941][T26127] ? __mutex_lock+0x45d/0x13c0 [ 1215.259729][T26127] __kernfs_new_node+0xf0/0x6c0 [ 1215.264605][T26127] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1215.270081][T26127] ? wait_for_completion+0x440/0x440 [ 1215.275470][T26127] ? __kasan_check_write+0x14/0x20 [ 1215.280801][T26127] ? mutex_unlock+0xd/0x10 [ 1215.285251][T26127] ? kernfs_activate+0x192/0x1f0 [ 1215.290408][T26127] kernfs_new_node+0x96/0x120 [ 1215.295320][T26127] __kernfs_create_file+0x51/0x33b [ 1215.300540][T26127] sysfs_add_file_mode_ns+0x222/0x560 [ 1215.306085][T26127] internal_create_group+0x359/0xc30 [ 1215.311385][T26127] ? bd_set_size+0x3f/0xb0 [ 1215.316049][T26127] ? remove_files.isra.0+0x190/0x190 [ 1215.321527][T26127] ? __kasan_check_write+0x14/0x20 [ 1215.326909][T26127] ? up_write+0x155/0x490 [ 1215.331265][T26127] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1215.337528][T26127] sysfs_create_group+0x20/0x30 [ 1215.342553][T26127] loop_set_fd+0xac1/0x1020 [ 1215.347497][T26127] lo_ioctl+0x1a3/0x1460 [ 1215.352028][T26127] ? trace_hardirqs_on+0x67/0x240 [ 1215.357157][T26127] ? loop_set_fd+0x1020/0x1020 [ 1215.361943][T26127] blkdev_ioctl+0xedb/0x1c1a [ 1215.366645][T26127] ? blkpg_ioctl+0xa90/0xa90 [ 1215.371260][T26127] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1215.377398][T26127] ? __kasan_check_read+0x11/0x20 [ 1215.382445][T26127] ? __kasan_check_read+0x11/0x20 [ 1215.387760][T26127] block_ioctl+0xee/0x130 [ 1215.392105][T26127] ? blkdev_fallocate+0x410/0x410 [ 1215.397287][T26127] do_vfs_ioctl+0xdb6/0x13e0 [ 1215.401978][T26127] ? ioctl_preallocate+0x210/0x210 [ 1215.407102][T26127] ? __fget+0x384/0x560 [ 1215.411279][T26127] ? ksys_dup3+0x3e0/0x3e0 [ 1215.415775][T26127] ? do_sys_open+0x31d/0x5d0 [ 1215.420387][T26127] ? tomoyo_file_ioctl+0x23/0x30 [ 1215.425341][T26127] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1215.431859][T26127] ? security_file_ioctl+0x8d/0xc0 [ 1215.436997][T26127] ksys_ioctl+0xab/0xd0 [ 1215.441170][T26127] __x64_sys_ioctl+0x73/0xb0 [ 1215.445782][T26127] do_syscall_64+0xfa/0x760 [ 1215.450535][T26127] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1215.456438][T26127] RIP: 0033:0x459697 07:32:08 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$KDMKTONE(r3, 0x4b30, 0x20000000000) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) [ 1215.460351][T26127] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1215.480159][T26127] RSP: 002b:00007fb3c4759a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1215.488829][T26127] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1215.496820][T26127] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1215.504903][T26127] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1215.513137][T26127] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1215.521136][T26127] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:32:08 executing program 3: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x1f) 07:32:08 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) clone(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/0\x00yFAtz\x9b\x88\xb3\x04\x04\xd7a7\x1a\xb2h-ex\xb4\x13\x89\xc1\xc6_\xd9\xb3<^\xfe\b\x10\f\xad\xf6\xd6J\th\xeb;!o\xa2\xcf\xc18)\xa29\xca#9\xbc$\xfd\xef~\x12\x81\xd4\xc5~c\b\xb1\xb091\xbe\xe0%k\x83\xeen\xa6R\xab`:{\x97rg\xd3.\x13\x10\xaf]\xc1\xf7\xec\xcdz\xb2\x00W\xd5G\xff\x9c\xa4Z\xac\x85n\xcc\x00') r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) ioctl$void(r2, 0x5450) 07:32:08 executing program 5 (fault-call:2 fault-nth:23): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:32:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x02', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfu\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:08 executing program 3: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x1f) 07:32:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfp\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1215.809999][T26312] FAULT_INJECTION: forcing a failure. [ 1215.809999][T26312] name failslab, interval 1, probability 0, space 0, times 0 [ 1215.831067][T26312] CPU: 1 PID: 26312 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1215.840580][T26312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1215.850766][T26312] Call Trace: [ 1215.854288][T26312] dump_stack+0x172/0x1f0 [ 1215.858821][T26312] should_fail.cold+0xa/0x15 [ 1215.863570][T26312] ? fault_create_debugfs_attr+0x180/0x180 [ 1215.869649][T26312] ? page_to_nid.part.0+0x20/0x20 [ 1215.874697][T26312] ? ___might_sleep+0x163/0x280 [ 1215.879574][T26312] __should_failslab+0x121/0x190 [ 1215.884535][T26312] should_failslab+0x9/0x14 [ 1215.889229][T26312] kmem_cache_alloc+0x2aa/0x710 [ 1215.894108][T26312] ? __mutex_lock+0x45d/0x13c0 [ 1215.899058][T26312] __kernfs_new_node+0xf0/0x6c0 [ 1215.904110][T26312] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1215.909585][T26312] ? wait_for_completion+0x440/0x440 [ 1215.914981][T26312] ? __kasan_check_write+0x14/0x20 [ 1215.920147][T26312] ? mutex_unlock+0xd/0x10 [ 1215.924581][T26312] ? kernfs_activate+0x192/0x1f0 [ 1215.930013][T26312] kernfs_new_node+0x96/0x120 [ 1215.934717][T26312] __kernfs_create_file+0x51/0x33b [ 1215.940034][T26312] sysfs_add_file_mode_ns+0x222/0x560 [ 1215.945607][T26312] internal_create_group+0x359/0xc30 [ 1215.950913][T26312] ? bd_set_size+0x3f/0xb0 [ 1215.955352][T26312] ? remove_files.isra.0+0x190/0x190 [ 1215.960660][T26312] ? __kasan_check_write+0x14/0x20 [ 1215.965792][T26312] ? up_write+0x155/0x490 [ 1215.970385][T26312] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1215.976647][T26312] sysfs_create_group+0x20/0x30 [ 1215.981606][T26312] loop_set_fd+0xac1/0x1020 [ 1215.986187][T26312] lo_ioctl+0x1a3/0x1460 [ 1215.990449][T26312] ? trace_hardirqs_on+0x67/0x240 [ 1215.995623][T26312] ? loop_set_fd+0x1020/0x1020 [ 1216.000428][T26312] blkdev_ioctl+0xedb/0x1c1a [ 1216.005270][T26312] ? blkpg_ioctl+0xa90/0xa90 [ 1216.009880][T26312] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1216.015833][T26312] ? __kasan_check_read+0x11/0x20 [ 1216.020885][T26312] ? __kasan_check_read+0x11/0x20 [ 1216.025934][T26312] block_ioctl+0xee/0x130 [ 1216.030284][T26312] ? blkdev_fallocate+0x410/0x410 [ 1216.035331][T26312] do_vfs_ioctl+0xdb6/0x13e0 [ 1216.039949][T26312] ? ioctl_preallocate+0x210/0x210 [ 1216.045080][T26312] ? __fget+0x384/0x560 [ 1216.049259][T26312] ? ksys_dup3+0x3e0/0x3e0 [ 1216.053863][T26312] ? do_sys_open+0x31d/0x5d0 [ 1216.058474][T26312] ? tomoyo_file_ioctl+0x23/0x30 [ 1216.063429][T26312] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1216.069807][T26312] ? security_file_ioctl+0x8d/0xc0 [ 1216.074962][T26312] ksys_ioctl+0xab/0xd0 [ 1216.079225][T26312] __x64_sys_ioctl+0x73/0xb0 [ 1216.083927][T26312] do_syscall_64+0xfa/0x760 [ 1216.088801][T26312] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1216.094706][T26312] RIP: 0033:0x459697 [ 1216.098648][T26312] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1216.118734][T26312] RSP: 002b:00007fb3c4759a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1216.127539][T26312] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1216.135807][T26312] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1216.144015][T26312] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1216.152370][T26312] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 07:32:09 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) flistxattr(r1, &(0x7f0000000340)=""/112, 0x70) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000002c0)={'ipvs\x00'}, &(0x7f0000000300)=0x1e) r4 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="00042abd00000c00080062eaffffffffffef0c000600010000000000000008000100000000000c00080001000000000000000c000800a1000000000000000c00060001000000000000000c0006000200"/94], 0x64}, 0x1, 0x0, 0x0, 0x40}, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000140)) r5 = syz_open_pts(r3, 0x0) dup3(r5, r3, 0x0) ppoll(&(0x7f00000001c0)=[{r5}, {r3}], 0x2, 0x0, 0x0, 0x0) 07:32:09 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x1f) [ 1216.160358][T26312] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:32:09 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x1f) 07:32:09 executing program 5 (fault-call:2 fault-nth:24): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:32:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfu\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:09 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x1f) 07:32:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfx\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x03', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:09 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x1f) 07:32:09 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) sysfs$1(0x1, &(0x7f0000000000)=')\xf3\x00') ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) [ 1216.552800][T26523] FAULT_INJECTION: forcing a failure. [ 1216.552800][T26523] name failslab, interval 1, probability 0, space 0, times 0 [ 1216.576501][T26523] CPU: 1 PID: 26523 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1216.585842][T26523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1216.595914][T26523] Call Trace: [ 1216.599228][T26523] dump_stack+0x172/0x1f0 [ 1216.603818][T26523] should_fail.cold+0xa/0x15 [ 1216.608517][T26523] ? fault_create_debugfs_attr+0x180/0x180 [ 1216.614430][T26523] ? page_to_nid.part.0+0x20/0x20 [ 1216.619474][T26523] ? ___might_sleep+0x163/0x280 [ 1216.624432][T26523] __should_failslab+0x121/0x190 [ 1216.629391][T26523] should_failslab+0x9/0x14 [ 1216.633912][T26523] kmem_cache_alloc+0x2aa/0x710 [ 1216.638792][T26523] ? __mutex_lock+0x45d/0x13c0 [ 1216.643736][T26523] __kernfs_new_node+0xf0/0x6c0 [ 1216.648606][T26523] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1216.654095][T26523] ? wait_for_completion+0x440/0x440 [ 1216.659402][T26523] ? __kasan_check_write+0x14/0x20 [ 1216.664641][T26523] ? mutex_unlock+0xd/0x10 [ 1216.669085][T26523] ? kernfs_activate+0x192/0x1f0 [ 1216.676580][T26523] kernfs_new_node+0x96/0x120 [ 1216.681282][T26523] __kernfs_create_file+0x51/0x33b [ 1216.686595][T26523] sysfs_add_file_mode_ns+0x222/0x560 [ 1216.692003][T26523] internal_create_group+0x359/0xc30 [ 1216.697478][T26523] ? bd_set_size+0x3f/0xb0 [ 1216.701918][T26523] ? remove_files.isra.0+0x190/0x190 [ 1216.707312][T26523] ? __kasan_check_write+0x14/0x20 [ 1216.712440][T26523] ? up_write+0x155/0x490 [ 1216.716792][T26523] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1216.723061][T26523] sysfs_create_group+0x20/0x30 [ 1216.727953][T26523] loop_set_fd+0xac1/0x1020 [ 1216.732480][T26523] lo_ioctl+0x1a3/0x1460 [ 1216.736744][T26523] ? trace_hardirqs_on+0x67/0x240 [ 1216.741926][T26523] ? loop_set_fd+0x1020/0x1020 [ 1216.746955][T26523] blkdev_ioctl+0xedb/0x1c1a [ 1216.751685][T26523] ? blkpg_ioctl+0xa90/0xa90 [ 1216.756542][T26523] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1216.762379][T26523] ? __kasan_check_read+0x11/0x20 [ 1216.767509][T26523] ? __kasan_check_read+0x11/0x20 [ 1216.772905][T26523] block_ioctl+0xee/0x130 [ 1216.777260][T26523] ? blkdev_fallocate+0x410/0x410 [ 1216.782435][T26523] do_vfs_ioctl+0xdb6/0x13e0 [ 1216.787041][T26523] ? ioctl_preallocate+0x210/0x210 [ 1216.792260][T26523] ? __fget+0x384/0x560 [ 1216.796433][T26523] ? ksys_dup3+0x3e0/0x3e0 [ 1216.800880][T26523] ? do_sys_open+0x31d/0x5d0 [ 1216.805490][T26523] ? tomoyo_file_ioctl+0x23/0x30 [ 1216.811101][T26523] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1216.817372][T26523] ? security_file_ioctl+0x8d/0xc0 [ 1216.822498][T26523] ksys_ioctl+0xab/0xd0 [ 1216.826670][T26523] __x64_sys_ioctl+0x73/0xb0 [ 1216.831281][T26523] do_syscall_64+0xfa/0x760 [ 1216.835895][T26523] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1216.841801][T26523] RIP: 0033:0x459697 [ 1216.845716][T26523] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1216.865740][T26523] RSP: 002b:00007fb3c4759a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1216.874352][T26523] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1216.882422][T26523] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1216.890491][T26523] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1216.898737][T26523] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1216.906900][T26523] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:32:10 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x1f) 07:32:10 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x40000) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x10) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)) r3 = syz_open_pts(r2, 0x0) r4 = dup3(r3, r2, 0x0) ppoll(&(0x7f00000001c0)=[{r3}, {r2}], 0x2, 0x0, 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000fff000/0x1000)=nil, 0x1000}, &(0x7f0000000040)=0x10) 07:32:10 executing program 5 (fault-call:2 fault-nth:25): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:32:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfx\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x02', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:10 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x1f) 07:32:10 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0xa) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) [ 1217.258854][T26668] FAULT_INJECTION: forcing a failure. [ 1217.258854][T26668] name failslab, interval 1, probability 0, space 0, times 0 [ 1217.274474][T26668] CPU: 0 PID: 26668 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1217.283715][T26668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1217.293796][T26668] Call Trace: [ 1217.297113][T26668] dump_stack+0x172/0x1f0 [ 1217.301588][T26668] should_fail.cold+0xa/0x15 [ 1217.306214][T26668] ? fault_create_debugfs_attr+0x180/0x180 [ 1217.312041][T26668] ? page_to_nid.part.0+0x20/0x20 [ 1217.317087][T26668] ? ___might_sleep+0x163/0x280 [ 1217.322135][T26668] __should_failslab+0x121/0x190 [ 1217.327176][T26668] should_failslab+0x9/0x14 [ 1217.331701][T26668] kmem_cache_alloc+0x2aa/0x710 [ 1217.336662][T26668] ? __mutex_lock+0x45d/0x13c0 [ 1217.341449][T26668] __kernfs_new_node+0xf0/0x6c0 [ 1217.346405][T26668] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1217.351877][T26668] ? wait_for_completion+0x440/0x440 [ 1217.357187][T26668] ? __kasan_check_write+0x14/0x20 [ 1217.362442][T26668] ? mutex_unlock+0xd/0x10 [ 1217.366880][T26668] ? kernfs_activate+0x192/0x1f0 [ 1217.371922][T26668] kernfs_new_node+0x96/0x120 [ 1217.376820][T26668] __kernfs_create_file+0x51/0x33b [ 1217.382048][T26668] sysfs_add_file_mode_ns+0x222/0x560 [ 1217.387658][T26668] internal_create_group+0x359/0xc30 [ 1217.392960][T26668] ? bd_set_size+0x3f/0xb0 [ 1217.397485][T26668] ? remove_files.isra.0+0x190/0x190 [ 1217.402929][T26668] ? __kasan_check_write+0x14/0x20 [ 1217.408061][T26668] ? up_write+0x155/0x490 [ 1217.412497][T26668] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1217.418765][T26668] sysfs_create_group+0x20/0x30 [ 1217.423634][T26668] loop_set_fd+0xac1/0x1020 [ 1217.428442][T26668] lo_ioctl+0x1a3/0x1460 [ 1217.432721][T26668] ? trace_hardirqs_on+0x67/0x240 [ 1217.437789][T26668] ? loop_set_fd+0x1020/0x1020 [ 1217.442574][T26668] blkdev_ioctl+0xedb/0x1c1a [ 1217.447239][T26668] ? blkpg_ioctl+0xa90/0xa90 [ 1217.451849][T26668] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1217.457836][T26668] ? __kasan_check_read+0x11/0x20 [ 1217.463069][T26668] ? __kasan_check_read+0x11/0x20 [ 1217.468115][T26668] block_ioctl+0xee/0x130 [ 1217.472463][T26668] ? blkdev_fallocate+0x410/0x410 [ 1217.477643][T26668] do_vfs_ioctl+0xdb6/0x13e0 [ 1217.482378][T26668] ? ioctl_preallocate+0x210/0x210 [ 1217.487809][T26668] ? __fget+0x384/0x560 [ 1217.492012][T26668] ? ksys_dup3+0x3e0/0x3e0 [ 1217.496735][T26668] ? do_sys_open+0x31d/0x5d0 [ 1217.501455][T26668] ? tomoyo_file_ioctl+0x23/0x30 [ 1217.506429][T26668] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1217.512694][T26668] ? security_file_ioctl+0x8d/0xc0 [ 1217.517958][T26668] ksys_ioctl+0xab/0xd0 [ 1217.522362][T26668] __x64_sys_ioctl+0x73/0xb0 [ 1217.526993][T26668] do_syscall_64+0xfa/0x760 [ 1217.531618][T26668] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1217.537614][T26668] RIP: 0033:0x459697 [ 1217.542483][T26668] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1217.562201][T26668] RSP: 002b:00007fb3c4759a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1217.571010][T26668] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1217.579241][T26668] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 1217.587404][T26668] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1217.595489][T26668] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1217.603794][T26668] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 07:32:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x04', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:10 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:10 executing program 4: socketpair$unix(0x1, 0x25c280863c62b704, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$TIOCNXCL(r2, 0x540d) getsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:32:10 executing program 3 (fault-call:2 fault-nth:0): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:10 executing program 5 (fault-call:2 fault-nth:26): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:32:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x02', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:11 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) dup2(r0, r3) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000000)) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:32:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x03', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1217.979697][T26897] FAULT_INJECTION: forcing a failure. [ 1217.979697][T26897] name failslab, interval 1, probability 0, space 0, times 0 [ 1218.012297][T26897] CPU: 0 PID: 26897 Comm: syz-executor.3 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1218.021446][T26897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1218.031515][T26897] Call Trace: [ 1218.034921][T26897] dump_stack+0x172/0x1f0 [ 1218.039404][T26897] should_fail.cold+0xa/0x15 [ 1218.044015][T26897] ? fault_create_debugfs_attr+0x180/0x180 [ 1218.049839][T26897] ? page_to_nid.part.0+0x20/0x20 [ 1218.054966][T26897] ? ___might_sleep+0x163/0x280 [ 1218.059928][T26897] __should_failslab+0x121/0x190 [ 1218.064975][T26897] should_failslab+0x9/0x14 [ 1218.069494][T26897] kmem_cache_alloc+0x2aa/0x710 [ 1218.074362][T26897] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1218.080618][T26897] ? __validate_process_creds+0x22d/0x380 [ 1218.086587][T26897] prepare_creds+0x3e/0x430 [ 1218.091283][T26897] cap_task_prctl+0x641/0xb60 [ 1218.095988][T26897] security_task_prctl+0x73/0xf0 [ 1218.100949][T26897] __x64_sys_prctl+0x148/0xf50 [ 1218.105822][T26897] ? __ia32_sys_umask+0xb0/0xb0 [ 1218.110693][T26897] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1218.116790][T26897] ? trace_hardirqs_off_caller+0x65/0x230 [ 1218.122535][T26897] ? trace_hardirqs_on+0x67/0x240 [ 1218.127584][T26897] do_syscall_64+0xfa/0x760 [ 1218.132174][T26897] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1218.138132][T26897] RIP: 0033:0x459829 [ 1218.142048][T26897] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1218.161841][T26897] RSP: 002b:00007f8c43c5fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000009d [ 1218.170543][T26897] RAX: ffffffffffffffda RBX: 00007f8c43c5fc90 RCX: 0000000000459829 07:32:11 executing program 3 (fault-call:2 fault-nth:1): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) [ 1218.178721][T26897] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000018 [ 1218.186716][T26897] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1218.194707][T26897] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8c43c606d4 [ 1218.202701][T26897] R13: 00000000004c670c R14: 00000000004db7d0 R15: 0000000000000005 [ 1218.280775][T26899] FAULT_INJECTION: forcing a failure. [ 1218.280775][T26899] name failslab, interval 1, probability 0, space 0, times 0 [ 1218.301210][T26899] CPU: 1 PID: 26899 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1218.310448][T26899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1218.321134][T26899] Call Trace: [ 1218.324579][T26899] dump_stack+0x172/0x1f0 [ 1218.328932][T26899] should_fail.cold+0xa/0x15 [ 1218.333784][T26899] ? fault_create_debugfs_attr+0x180/0x180 [ 1218.339625][T26899] ? page_to_nid.part.0+0x20/0x20 [ 1218.344862][T26899] ? ___might_sleep+0x163/0x280 [ 1218.349820][T26899] __should_failslab+0x121/0x190 [ 1218.354951][T26899] should_failslab+0x9/0x14 [ 1218.359467][T26899] kmem_cache_alloc_node+0x268/0x740 [ 1218.364858][T26899] ? vprintk_default+0x28/0x30 [ 1218.369726][T26899] ? netlink_has_listeners+0x23b/0x3f0 [ 1218.375221][T26899] ? __kasan_check_read+0x11/0x20 [ 1218.380487][T26899] __alloc_skb+0xd5/0x5e0 [ 1218.385034][T26899] ? netdev_alloc_frag+0x1b0/0x1b0 [ 1218.390250][T26899] ? netlink_has_listeners+0x6e/0x3f0 [ 1218.395806][T26899] alloc_uevent_skb+0x83/0x1e2 [ 1218.400597][T26899] kobject_uevent_env+0xaa3/0x1023 [ 1218.405897][T26899] kobject_uevent+0x20/0x26 [ 1218.410502][T26899] loop_set_fd+0xb52/0x1020 [ 1218.415067][T26899] lo_ioctl+0x1a3/0x1460 [ 1218.419326][T26899] ? trace_hardirqs_on+0x67/0x240 [ 1218.424453][T26899] ? loop_set_fd+0x1020/0x1020 [ 1218.429233][T26899] blkdev_ioctl+0xedb/0x1c1a [ 1218.433849][T26899] ? blkpg_ioctl+0xa90/0xa90 [ 1218.438453][T26899] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1218.444297][T26899] ? __kasan_check_read+0x11/0x20 [ 1218.449523][T26899] ? __kasan_check_read+0x11/0x20 [ 1218.454659][T26899] block_ioctl+0xee/0x130 [ 1218.459002][T26899] ? blkdev_fallocate+0x410/0x410 [ 1218.464046][T26899] do_vfs_ioctl+0xdb6/0x13e0 [ 1218.468744][T26899] ? ioctl_preallocate+0x210/0x210 [ 1218.474020][T26899] ? __fget+0x384/0x560 [ 1218.478190][T26899] ? ksys_dup3+0x3e0/0x3e0 [ 1218.482763][T26899] ? do_sys_open+0x31d/0x5d0 [ 1218.487370][T26899] ? tomoyo_file_ioctl+0x23/0x30 [ 1218.492421][T26899] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1218.498681][T26899] ? security_file_ioctl+0x8d/0xc0 [ 1218.503925][T26899] ksys_ioctl+0xab/0xd0 [ 1218.508187][T26899] __x64_sys_ioctl+0x73/0xb0 [ 1218.514146][T26899] do_syscall_64+0xfa/0x760 [ 1218.525980][T26899] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1218.531965][T26899] RIP: 0033:0x459697 [ 1218.536164][T26899] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1218.555960][T26899] RSP: 002b:00007fb3c4759a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1218.564541][T26899] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1218.572615][T26899] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 07:32:11 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)={0x0, 0x0, 0x2000000000, 0x4}) r2 = syz_open_pts(r1, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x40) ioctl$VIDIOC_SUBDEV_G_SELECTION(r3, 0xc040563d, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x1, {0xff, 0x100000001, 0xbc, 0xf285}}) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:32:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x05', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) [ 1218.580804][T26899] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1218.588927][T26899] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1218.597092][T26899] R13: 00000000004c89b5 R14: 00000000004df880 R15: 0000000000000004 [ 1218.636486][T27010] FAULT_INJECTION: forcing a failure. [ 1218.636486][T27010] name failslab, interval 1, probability 0, space 0, times 0 [ 1218.649705][T27010] CPU: 1 PID: 27010 Comm: syz-executor.3 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1218.658839][T27010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1218.669060][T27010] Call Trace: [ 1218.674880][T27010] dump_stack+0x172/0x1f0 [ 1218.679240][T27010] should_fail.cold+0xa/0x15 [ 1218.683865][T27010] ? fault_create_debugfs_attr+0x180/0x180 [ 1218.689820][T27010] ? page_to_nid.part.0+0x20/0x20 [ 1218.694986][T27010] ? ___might_sleep+0x163/0x280 [ 1218.699862][T27010] __should_failslab+0x121/0x190 [ 1218.704818][T27010] should_failslab+0x9/0x14 [ 1218.709335][T27010] __kmalloc+0x2e0/0x770 [ 1218.713592][T27010] ? refcount_inc_not_zero_checked+0x144/0x200 [ 1218.719757][T27010] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 1218.725582][T27010] ? security_prepare_creds+0x11d/0x190 [ 1218.731148][T27010] security_prepare_creds+0x11d/0x190 [ 1218.736703][T27010] prepare_creds+0x32a/0x430 [ 1218.741312][T27010] cap_task_prctl+0x641/0xb60 [ 1218.746012][T27010] security_task_prctl+0x73/0xf0 [ 1218.751058][T27010] __x64_sys_prctl+0x148/0xf50 [ 1218.755945][T27010] ? __ia32_sys_umask+0xb0/0xb0 [ 1218.760819][T27010] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1218.766910][T27010] ? trace_hardirqs_off_caller+0x65/0x230 [ 1218.772667][T27010] ? trace_hardirqs_on+0x67/0x240 [ 1218.777991][T27010] do_syscall_64+0xfa/0x760 [ 1218.782520][T27010] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1218.788429][T27010] RIP: 0033:0x459829 [ 1218.792339][T27010] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1218.812126][T27010] RSP: 002b:00007f8c43c5fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000009d [ 1218.820841][T27010] RAX: ffffffffffffffda RBX: 00007f8c43c5fc90 RCX: 0000000000459829 [ 1218.829015][T27010] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000018 [ 1218.837175][T27010] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1218.845258][T27010] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8c43c606d4 [ 1218.853252][T27010] R13: 00000000004c670c R14: 00000000004db7d0 R15: 0000000000000005 07:32:11 executing program 3 (fault-call:2 fault-nth:2): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 07:32:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x03', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:12 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:12 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2e4, 0x0, 0x0, 0x0) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000000)={0xffffffffffffff64, "3fa00b5d2c6281fc4a0ee6139b2fc0a155812ed3baf956e2ce360d4d3a40be5e", 0x3, 0x1}) 07:32:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x04', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:12 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x7, 0x0) 07:32:12 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCNOTTY(r1, 0x5422) alarm(0x8001) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:32:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x06', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x2, 0x0, 0x0, 0x42440000, 0x0) 07:32:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x04', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x05', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:12 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x8, 0x0) 07:32:12 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x100) openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x900, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x20000, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x1c9980) r3 = dup3(r2, r1, 0x0) r4 = geteuid() ioctl$TUNSETOWNER(r3, 0x400454cc, r4) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)=0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x2000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x8001}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x400}}], [{@dont_measure='dont_measure'}, {@obj_role={'obj_role', 0x3d, '/dev/ptmx\x00'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r4}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@uid_gt={'uid>', r4}}, {@appraise='appraise'}, {@euid_gt={'euid>', r4}}, {@seclabel='seclabel'}]}}) 07:32:12 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x17, 0x0) 07:32:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\a', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:12 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x1b, 0x0) 07:32:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x06', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x05', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x3, 0x0, 0x0, 0x42440000, 0x0) 07:32:12 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x1c, 0x0) 07:32:12 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x2f, 0x0) 07:32:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\b', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:13 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x6, 0x200000) bind$rose(r0, &(0x7f00000000c0)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x1, @bcast}, 0x1c) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)) r3 = syz_open_pts(r2, 0x0) r4 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3, 0x10080) write$uinput_user_dev(r4, &(0x7f0000000200)={'syz1\x00', {0x7, 0x4, 0x4e29, 0x100000001}, 0x27, [0x66d6c842, 0x7f, 0x2, 0x20, 0x0, 0x8000, 0x137, 0x3e, 0x8, 0x80, 0x9, 0x4, 0x85, 0x4, 0x4, 0x5, 0x9, 0x1f, 0xd5a1, 0x7fff, 0x597, 0xb4, 0x1, 0x80000001, 0x5b, 0x3, 0x9, 0x7, 0xe409, 0x4, 0x4e, 0x9, 0x6, 0x4, 0x5175bead, 0x8, 0x5, 0x800, 0xffff, 0x7f, 0x81, 0x4, 0x2, 0x7f, 0x6, 0x7, 0x76a8, 0x0, 0x9, 0xfffffffffffffffe, 0x10000, 0x81, 0x1, 0xe22f, 0x2, 0xed, 0x100000000, 0x20, 0x3, 0x1, 0x101, 0x1000, 0x80, 0x7], [0x0, 0x1, 0x5ca6, 0x0, 0xc4, 0x8, 0x3ff, 0x7fff, 0xfffffffffffffffa, 0x3, 0xa05c, 0x1, 0xf524, 0x7fffffff, 0xac, 0x0, 0x1, 0x7, 0x400, 0x0, 0xa0a, 0x4, 0x4, 0x7fffffff, 0xdbf2, 0x1, 0x40, 0x7, 0x7, 0x9, 0x7, 0x8, 0x0, 0x7, 0x8001, 0x9, 0x7fffffff, 0x6, 0xb49, 0x6, 0x6402, 0x9, 0x2, 0xffff, 0x80000001, 0x7, 0x80, 0x3f, 0x100, 0xf, 0x7fffffff, 0x200, 0x7, 0x0, 0x5, 0x6, 0x1, 0x8, 0xfff, 0x4, 0x7, 0x6, 0x5, 0x6], [0x1, 0x401, 0x21a6, 0x9, 0x0, 0x1, 0x4, 0xffffffffffff0001, 0x0, 0x4, 0x46f, 0x80000000, 0xec85, 0x81, 0x5, 0x58, 0x9, 0x80000001, 0x1ff, 0x3, 0x100, 0x8, 0x3, 0x20, 0x5b, 0x7fffffff, 0x0, 0x0, 0x4, 0x2, 0xa579, 0xc1, 0x10000, 0xe8, 0x4, 0x1f, 0x7, 0x9, 0x1, 0x800, 0x7, 0x24, 0x7ff, 0x3ff, 0x63, 0x1, 0x206d, 0x4, 0xfffffffffffffffb, 0x9, 0x81, 0x3, 0x7, 0x3, 0x7fff, 0xfffffffffffffff7, 0x5, 0x1, 0x9, 0x200, 0x3, 0x5, 0xfffffffffffffffa, 0x2], [0xd2, 0x5, 0x3, 0x3, 0x20, 0x4, 0x4, 0x8d4, 0x6, 0x8, 0x5, 0x1ff, 0xde, 0x1, 0x200, 0x4, 0x7, 0x2, 0x0, 0x9, 0x9, 0x8, 0x200000000000000, 0xf09, 0x5, 0x6, 0xe3, 0x81, 0xe8, 0x5, 0x6dc5, 0x0, 0x3, 0x6, 0x2, 0xd1c, 0x7, 0x9, 0x0, 0x0, 0x8, 0x35, 0x7404, 0x8, 0x0, 0x8, 0x5c, 0x8001, 0x7, 0x1, 0x10000, 0xffff, 0x8, 0x0, 0x2, 0xa095, 0xffffffffffff8001, 0x80, 0xe8, 0x9, 0x8001, 0x800, 0x2, 0x35]}, 0x45c) dup3(r3, r2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000100), 0x4) ppoll(&(0x7f00000001c0)=[{r3}, {r2}], 0x2, 0x0, 0x0, 0x0) 07:32:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x4, 0x0, 0x0, 0x42440000, 0x0) 07:32:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\a', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:13 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x59616d61, 0x0) 07:32:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x06', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:13 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x119440, 0x0) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000200)={0xe, 0x7, 0x8000, 0xfffffffffffffffb, 0xbd, "817108f06d0b4b4bdb4c37b4e52b5a6dc363d8c1520dc1ae7a2a38cd0a17e25fec53eae7bb3447f42dce35dbaeb6461d6a3c4d273f26fc9df86920a3ddc4ed2eec29fdbb91203ca58583bdaa52d626beb1ddb7af8e7428a9ff28156cd2bb9fffe921df325fd647504d4a6dc23640f58da77f079c441262bb6a6dc1dfa56f456e47db45f323f456d4c7726811716e9035224176663d00efc53d12512170b1a57d62e485eaee85c55aa957d4154b4a8ca4facf51a5c6b97ace591dc18054"}, 0xc9) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r3 = syz_open_pts(r1, 0x0) dup3(r3, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r3}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:32:13 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x25) 07:32:13 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0xda) 07:32:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\t', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:13 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r2 = accept4(r0, 0x0, &(0x7f0000000000), 0x800) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000040)={0x0, 0xbd4, 0x20}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000100)={r3, 0x9}, &(0x7f0000000200)=0x8) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r4 = syz_open_pts(r1, 0x0) dup3(r4, r1, 0x0) ppoll(&(0x7f0000000280)=[{r4, 0x20}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:32:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x5, 0x0, 0x0, 0x42440000, 0x0) 07:32:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\b', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\a', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:13 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x2500) 07:32:13 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)) r3 = syz_open_pts(r2, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x4) r4 = dup3(r3, r2, 0x0) ppoll(&(0x7f00000001c0)=[{r3}, {r2}], 0x2, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@int=0x3, 0x4) 07:32:13 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x4000) 07:32:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x6, 0x0, 0x0, 0x42440000, 0x0) 07:32:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\b', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\t', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:13 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0xdaff) 07:32:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\n', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000200)={r4, 0x5f4, 0x0, 0x0, 0x21b2, 0x3}, &(0x7f0000000240)=0x14) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) ioctl$sock_ax25_SIOCDELRT(r3, 0x890c, &(0x7f0000000080)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5, [@default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:32:13 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0xffda) 07:32:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x7, 0x0, 0x0, 0x42440000, 0x0) 07:32:14 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)) r3 = syz_open_pts(r2, 0x0) r4 = dup3(r3, r2, 0x0) ppoll(&(0x7f00000001c0)=[{r3}, {r2}], 0x2, 0x0, 0x0, 0x0) fcntl$setpipe(r0, 0x407, 0x3) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) fstat(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in=@dev={0xac, 0x14, 0x14, 0xf}, 0x4e23, 0x0, 0x4e22, 0x0, 0xa, 0x20, 0x20, 0xc, 0x0, r5}, {0x9, 0x9, 0xd05b, 0xec, 0x3, 0x1f, 0x9, 0x9a2}, {0x9, 0x7, 0x8, 0xc4dc}, 0x6, 0x6e6bb6, 0x2, 0x0, 0x1, 0x2}, {{@in6=@mcast2, 0x4d4, 0x3f}, 0xa, @in=@loopback, 0x3507, 0x1, 0x0, 0x9, 0x5b32, 0xfffffffffffffffd, 0xfff}}, 0xe8) 07:32:14 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x25000000) 07:32:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\n', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\t', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:14 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x40000000) 07:32:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x10', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x8, 0x0, 0x0, 0x42440000, 0x0) 07:32:14 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:32:14 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0xdaffffff) 07:32:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x0e', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\n', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:14 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x9, 0x800) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0xd4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:32:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x10, 0x0, 0x0, 0x42440000, 0x0) 07:32:14 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0xffffffda) 07:32:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x10', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:14 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x2500000000000000) 07:32:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfsH', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:14 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8001, 0x200) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000000c0)={0x8, 0x9, 0x4, 0x20, {}, {0x5, 0x77384f8143b4d153, 0x2, 0x5, 0x101, 0x4f, "16a93af0"}, 0x9, 0x6, @offset, 0x4}) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:32:14 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x4000000000000000) 07:32:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x0e', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:14 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x0, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x3f) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)) r3 = syz_open_dev$radio(&(0x7f0000003140)='/dev/radio#\x00', 0x2, 0x2) accept4$tipc(r3, &(0x7f0000000040)=@id, &(0x7f00000000c0)=0x1, 0x800) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r4 = syz_open_pts(r2, 0x0) dup3(r0, r0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) ppoll(&(0x7f00000001c0)=[{r4}, {r2}], 0x2, 0x0, 0x0, 0x0) 07:32:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x48, 0x0, 0x0, 0x42440000, 0x0) 07:32:15 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0xdaffffff00000000) 07:32:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs#', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:15 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0xdaffffffffffffff) 07:32:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfsL', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x4c, 0x0, 0x0, 0x42440000, 0x0) 07:32:15 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0xffffffffffffffda) 07:32:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x10', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfsH', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:15 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x30beb20084f3176e) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x100000004) 07:32:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x68, 0x0, 0x0, 0x42440000, 0x0) 07:32:15 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x101000, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee1, &(0x7f00000000c0)={0x0, 0x8, 0x8, &(0x7f0000000040)=0x4}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)) r3 = syz_open_pts(r2, 0x0) dup3(r3, r2, 0x0) ppoll(&(0x7f00000001c0)=[{r3}, {r2}], 0x2, 0x0, 0x0, 0x0) 07:32:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs`', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfsL', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x6c, 0x0, 0x0, 0x42440000, 0x0) 07:32:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs#', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:16 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) close(r0) socketpair$unix(0x1, 0xcc32facb2bbf5a01, 0x0, &(0x7f0000000000)) 07:32:16 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000000)={0x101, 0x0, 0x9}) 07:32:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x74, 0x0, 0x0, 0x42440000, 0x0) 07:32:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs`', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfsH', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:16 executing program 3: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfsh', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:16 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x8042, 0x0) ioctl$KVM_GET_REG_LIST(r3, 0xc008aeb0, &(0x7f00000000c0)={0x2, [0x10001, 0xb756]}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0xfffffffffffffffe, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2}, @in6={0xa, 0x4e24, 0x7, @remote}, @in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x4e22, 0x9, @rand_addr="0b3ee4529f58e526ad6d3cc0d9c8faf4", 0x4}, @in={0x2, 0x4e20, @local}], 0x74) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)) syz_open_pts(r2, 0x200) r4 = dup3(r3, r2, 0x0) ppoll(&(0x7f0000000000)=[{r0, 0x40}, {r2, 0xc}, {r2, 0x8}, {r4, 0x8}, {r1, 0x20}, {r0, 0x4}], 0x2000000000000096, 0x0, 0x0, 0x276) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r0) 07:32:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x8, 0x5}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000100)={r2, 0x9, 0x100000000, 0x6e}, 0x10) prctl$PR_CAPBSET_READ(0x17, 0x19) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000180)={0x1, 0x800a, 0x101, 0x3, r2}, &(0x7f0000000140)=0x7) 07:32:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x7a, 0x0, 0x0, 0x42440000, 0x0) 07:32:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfsh', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:16 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.mem_hardwall\x00', 0x2, 0x0) ioctl$VIDIOC_S_PRIORITY(r1, 0x40045644, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0x8) 07:32:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfsL', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:16 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_SOCK(r3, 0xab04) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) bind$nfc_llcp(r3, &(0x7f0000000000)={0x27, 0x0, 0x2001, 0x3f852c2e03c66e68, 0x8, 0x200, "6cedf5bb2269d95227f4061c3c0da19d7e5fcd5c3a00000000000000027f96f60be3fa5c9e40ba049e9a960f78f2d5ed98411b5900001c2c00", 0x2a}, 0x60) 07:32:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x300, 0x0, 0x0, 0x42440000, 0x0) 07:32:16 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x6) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="2321202e2f66696c65302020272173656c696e7578202e74727573746564776c616e3070707031202f6465762f726164696f23002020202f6465762f726164696f23000a38997f85832276807885422fb3c4b11a7bd6ef2a56ee2193a8ea329c7f5ae08385e0d776369af3ff909bf76ec24699b94d020edb14ce6256db656586a61f80e53d120d31f9b34aac67199492ccfc04ba81ed8ab36c1ab8d18660b4f8eb93c889a8f82ad6b97554e1e6e8210998d17ee5d0a86c633c3a7b3fc1ee6408000000c4"], 0xc9) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) recvfrom$packet(r1, &(0x7f00000000c0)=""/204, 0xcc, 0x0, &(0x7f00000001c0)={0x11, 0x1b, r2, 0x1, 0xfffffffffffffff7, 0x6, @remote}, 0x14) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000400)=0x4) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000300)=""/188, &(0x7f00000003c0)=0xbc) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfsl', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:16 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) ioctl$VT_DISALLOCATE(r2, 0x5608) dup3(r2, r1, 0x80000) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:32:16 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, &(0x7f0000000000)=0x1) 07:32:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs`', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x500, 0x0, 0x0, 0x42440000, 0x0) 07:32:17 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x3, 0x20000) setsockopt$inet6_buf(r2, 0x29, 0x30, &(0x7f00000002c0)="a034452228533445f69de20f8e9692dcf85ea6fa0d611fa8f185eb5c26e887a1d0981cee26922af631ae6235390d572af6442e1c0f2f03975fe66bd2302ac0e1d911fdeb6d3da484c031b3c6c09d1cbf0db77f5e5f846ef986ca7367a438fdf96f1bcd", 0x63) write(r1, &(0x7f0000000200)="1a3bab6e0abec0a3600f1e70391f90024a3d7ba86455abc7aa16272e1858ebdea8b3ef9469bc941321ace8ff204b13add8508c031cb75532d2b0703f67e536c1520a22597dea74afda74d95a66636bafd452ccbb607a6b3c7394a91ec2a44d613d207014af0fc04732ac3c88e1e282b31d75fee7e8c61298e64986d1bac60b54f00c103687fe0f6504e053e8a33c88451b6ddcb4afab3314d1b23223f0d29e7769bce2126599f56de56ae4fc0c1bae4779", 0xb1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000140)) r4 = syz_open_pts(r3, 0x0) dup3(r0, r3, 0xe591b290c8fa40e6) write$binfmt_misc(r0, &(0x7f0000000000)={'syz0', "59386b57d81b4294418aa4f6cdf8b94d8ad83a50cc4f99b4ebd0fe81e39b5726aa4927d3c1bab0332e29ed521b8eaba273f75acb91783f0384a9d965d341ee555d565a00912f983405b7"}, 0x4e) ppoll(&(0x7f00000001c0)=[{r4}, {r3}], 0x2, 0x0, 0x0, 0x0) 07:32:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfsl', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:17 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x27, 0x208842) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc0585604, &(0x7f00000000c0)={0x0, 0x0, {0x400, 0x9, 0x1011, 0x9, 0xc, 0xa884f4784b4fbc69, 0x3, 0x4}}) read(r0, &(0x7f0000000140)=""/247, 0xf7) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:17 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysinfo(&(0x7f0000000000)=""/25) prctl$PR_CAPBSET_DROP(0x18, 0x40000000014) 07:32:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfsh', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfst', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:17 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000040)={0x80000000, 0x3, 0x2, 0x1, 0x1}) prctl$PR_CAPBSET_DROP(0x18, 0x22) 07:32:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x600, 0x0, 0x0, 0x42440000, 0x0) 07:32:17 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000040)=0x4, &(0x7f00000000c0)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfst', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfsl', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:17 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000002c0)={'veth1_to_team\x00', {0x2, 0x4e20, @multicast2}}) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0xaa083, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:17 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)) r3 = syz_open_pts(r2, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40000, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f00000000c0)=[@in6={0xa, 0x4e24, 0x66086e31, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xb}}, 0x80000001}, @in6={0xa, 0x4e20, 0x4, @rand_addr="dadd29c59135ca21da4fb3633e3370cc", 0x3f}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e24, 0xfffffffffffffffe, @dev={0xfe, 0x80, [], 0x1e}, 0x40}], 0x64) dup3(r3, r0, 0x80000) ioctl$TIOCOUTQ(r3, 0x5411, &(0x7f0000000040)) ppoll(&(0x7f00000001c0)=[{r3}, {r2}], 0x2, 0x0, 0x0, 0x0) 07:32:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x700, 0x0, 0x0, 0x42440000, 0x0) 07:32:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfsz', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:17 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) r1 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0xd, 0x40400) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200), 0x0, 0xfffffffffffffffb) keyctl$read(0xb, r2, &(0x7f0000000240)=""/157, 0x9d) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000040)=0x8, r3, 0x0, 0x0, 0x1}}, 0x20) 07:32:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfst', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfsz', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:18 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x8000, 0x0) ioctl$MON_IOCQ_RING_SIZE(r1, 0x9205) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:18 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7f, 0x10400) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f00000000c0)={{0x77359400}, {r2, r3+30000000}}, &(0x7f0000000100)) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0xf28, 0x0, 0x0, 0x42440000, 0x0) 07:32:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfsz', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:18 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000240)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000100)={0x0, 0x81, 0x5, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x9, 0x4000) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$CAPI_GET_ERRCODE(r2, 0x80024321, &(0x7f0000000440)) syz_open_dev$dspn(&(0x7f0000000380)='/dev/dsp#\x00', 0x1f, 0x2) openat$dsp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dsp\x00', 0x4000, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0xfffffffffffffff8, 0x40) ioctl$BLKGETSIZE(r3, 0x1260, 0x0) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, 0x0) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f00000004c0)={0x0, @null, @rose={'rose', 0x0}, 0x0, 'syz0\x00', @bcast, 0x9, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast]}) prctl$PR_CAPBSET_DROP(0x18, 0x0) r4 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x400000) ioctl$KDSETKEYCODE(r4, 0x4b4d, &(0x7f0000000200)={0x2}) [ 1225.384604][T29440] hfs: can't find a HFS filesystem on dev loop0 07:32:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000000)=r3) 07:32:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:18 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x3c000, 0x0) ioctl$VIDIOC_S_FBUF(r1, 0x4030560b, &(0x7f00000000c0)={0x40, 0x40, &(0x7f0000000040), {0x10000, 0x4, 0x4c47504a, 0x8, 0x5bf, 0x33, 0xa, 0x7}}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x1020, 0x0, 0x0, 0x42440000, 0x0) 07:32:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:19 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='udf\x00', 0x8, &(0x7f0000000100)='\x00') prctl$PR_CAPBSET_DROP(0x18, 0x0) [ 1225.912295][T29559] hfs: gid requires an argument [ 1225.919473][T29559] hfs: unable to parse mount options [ 1225.973974][T29557] hfs: can't find a HFS filesystem on dev loop1 07:32:19 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f00000000c0)={0x100000000, 0xfffffffffffffff7}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)) r3 = syz_open_pts(r2, 0x0) dup3(r3, r2, 0x0) ppoll(&(0x7f0000000040)=[{r3}, {r2}], 0x2, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x7, 0x5, 0x7f, 0x1bb, 0x9}, 0x14) [ 1226.015513][T29565] hfs: can't find a HFS filesystem on dev loop0 07:32:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x1f00, 0x0, 0x0, 0x42440000, 0x0) 07:32:19 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000300)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000340)={r2, @loopback, @dev={0xac, 0x14, 0x14, 0x2b}}, 0xc) prctl$PR_CAPBSET_DROP(0x18, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x9, 0x9, 0x4, 0x5, 0x4}) 07:32:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1226.195121][T29679] hfs: gid requires an argument [ 1226.199996][T29679] hfs: unable to parse mount options 07:32:19 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r3, 0x402c5342, &(0x7f0000000000)={0x0, 0xffffffffffffff00, 0x7, {0x77359400}, 0x3, 0xfffffffffffffffe}) 07:32:19 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0xffffffffffffffe0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4000) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f0000000100)=0x400) splice(r0, &(0x7f0000000000), r1, &(0x7f0000000040), 0x0, 0xe) 07:32:19 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8140, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000100)={r1, 0x0, 0x0, 0x0, 0x1f}) prctl$PR_CAPBSET_DROP(0x18, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000, r2}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f00000000c0)={r3, 0x80000, r2}) 07:32:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x2000, 0x0, 0x0, 0x42440000, 0x0) 07:32:19 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9, 0x102) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r3, 0xc018620c, &(0x7f0000000040)={0x2}) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) [ 1226.423717][T29691] hfs: can't find a HFS filesystem on dev loop1 07:32:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1226.486779][T29698] hfs: can't find a HFS filesystem on dev loop0 07:32:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1226.548167][T29809] hfs: gid requires an argument [ 1226.558980][T29809] hfs: unable to parse mount options 07:32:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x14) 07:32:19 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x10000, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200880, 0x0) setsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x4, 0x2) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r3 = syz_open_pts(r1, 0x0) dup3(r3, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r3}, {r1}], 0x2, 0x0, 0x0, 0x0) [ 1226.694739][T29816] hfs: gid requires an argument [ 1226.700530][T29816] hfs: unable to parse mount options [ 1226.710203][T29819] hfs: can't find a HFS filesystem on dev loop1 07:32:19 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x8000, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000040)=""/54) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x2010, 0x0, 0x0, 0x42440000, 0x0) 07:32:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) [ 1226.896565][T29826] hfs: can't find a HFS filesystem on dev loop0 07:32:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:20 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000000)='./file0\x00', 0x8c00, 0x8) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x2, 0x0, 0x10000, 0xfffffffffffffff9}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f00000000c0)={r2, 0x8001}) prctl$PR_CAPBSET_DROP(0x18, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) 07:32:20 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x8800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fe) prctl$PR_CAPBSET_DROP(0x18, 0x0) [ 1227.108341][T29843] hfs: gid requires an argument [ 1227.119100][T29843] hfs: unable to parse mount options [ 1227.143835][T29842] hfs: can't find a HFS filesystem on dev loop1 [ 1227.150307][T29846] hfs: can't find a HFS filesystem on dev loop0 07:32:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x280f, 0x0, 0x0, 0x42440000, 0x0) 07:32:20 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = msgget$private(0x0, 0x1) msgctl$IPC_RMID(r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgget$private(0x0, 0x2) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1227.287616][T29859] hfs: gid requires an argument [ 1227.297392][T29859] hfs: unable to parse mount options [ 1227.476988][T29869] hfs: can't find a HFS filesystem on dev loop1 [ 1227.558764][T29875] hfs: can't find a HFS filesystem on dev loop0 07:32:20 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xf800000000000000, 0x400000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r1, 0x40045542, &(0x7f0000000040)=0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)) r3 = syz_open_pts(r2, 0x0) dup3(r3, r2, 0x0) ppoll(&(0x7f00000001c0)=[{r3}, {r2}], 0x2, 0x0, 0x0, 0x0) 07:32:20 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7f9, 0x8040) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000002600)=0x0) r5 = geteuid() r6 = getgid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000002640)={0x0}, &(0x7f0000002680)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000026c0)={{{@in=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f00000027c0)=0xe8) lstat(&(0x7f0000002800)='./file0\x00', &(0x7f0000002840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000002ac0)=0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002b00)={{{@in=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000002c00)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000002c40)={0x0, 0x0, 0x0}, &(0x7f0000002c80)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002d00)={0x0, r0, 0x0, 0x25, &(0x7f0000002cc0)='nodevposix_acl_accessmime_typecpuset\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002d40)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@remote}}, &(0x7f0000002e40)=0xe8) r15 = getgid() sendmmsg$unix(r2, &(0x7f0000003580)=[{&(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000040)=[{&(0x7f0000000140)="7fe01b94f553f78fba98fd3c82a7cf66d899e299e20f3957a22039241740a5bab5946f4f38331f4bafc27816d1f52dd612c4382e786eaf5991b512c896ad642bdca7a83c6a53b5dcd3a76fbea49008905119d3efad427e364f04cb61005114f98a3c0336f7f7a92d88ad49", 0x6b}], 0x1, 0x0, 0x0, 0x1}, {&(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002580)=[{&(0x7f0000000240)="c41e4cfa581e74f33180877f9dd85cb0346a6aee51e40be77e99dfd41c3ca33184b9510ac773cbcb51b9edfd5894f82addc2590f404c1dbd95d815f9b33bf5a9fa4ddf8697bbaccc110867e30cf765fb9c4c4609dfbfc2662fb47ff2f191de4a6e61b93eeedcb1781c9dbaf508eca3eb52f8ac6d27264f69258677c7d543ebbb5e62f24dde4500e2589490908c6986af1f3ed0cd2e2a35b7c3aa4a6fa75921018f9565828bba883fdca08593c9bf3a1539646a48a2e2c1f37d4e934bfa8f0aee405ad707e6e281e19b5554e0872fc11bda2f796efbeeb47030c417844b832877b75d04b90af641ce11539dbd383b5c151701ad9847f6666791dfc1822e7eefabbb1533faaa715f92b70d51059308fa44e727067c52f7ceab1495d32de83340ee6e923032a5c38f7ae69b5b624c2fc4afcb3a9d3e7fecdb16ed1b57706039c1fb750f847ad894531110e1475d45257d62ea26b176677aafcdb4589bdd8fb61c092bea677d74a67d774feadb13ca516687cc8f9a357cc4b64f464558fbf2ac1f4825a4d2ff798c5f0c6c2eb464eedf24fb8ee9b7785c5eadc30c0b1f533141e2bf3d250a15266965a60b6d87e1f0f85a5785cec334bb11d412c0156efab6ac88cf70ce2e15483fa1f98e4cb65bba88c2c0c9d04cde139360b6e45c2e6fb8acfd67cb3ed1e4eedc0a496684bba63ee48165f95e2d6b91a3d8dab1208cf45f5975802c58a7674edb65b5a0c5ff0d32f0f6067db043090d6ea98e0b25bdab96491bc3db948b3158f9a00b16674baf0090a3ff92fe9ac083bf977f27291991b150fa25b01d4e96c9bcef120de4c484f90e82c487c653943e5dcce7b04a026d83f9d7418037200995dc6de14e3cd738b6ec66517496d9b962808efb112fbff74f6e82eb401e9a62a9488f08093343b090ebd6fc0b7eb3124c9749f5e58127679fe4891e496e6f4e34092abfcb74ee2b4a973c7f0c832ee9d5e8d0955b8a607873cf42c8b93e0db1106c8af0b07a0a76e75a97dbc71d3c563c98a9c77f06138c9ea6442122bb1e2b241475b94a75edbbd83f5b1ca59c0b000f2393cdf4b0f363ff60e610fb5fe1b8261ae3b57b36b456b49a6faee597a149490fcfe3043410fa9c3cdf376055b82aec8e4f45e35f0544db5765f5f25403871f0d6ad0cf2dec973329085a5d97b8a5b6c58ea8d2c5e652cd0d6512275db5958c2f2381f2cf67f203e8b93edabac0fe059eef84f5025096757e3ebe6987b47301638882762169c06cf6dad4e3a5c87f7cf2fb75966c910b26141e4e25dd5d194e845f7d2360a4a3e951e64c0c90f88ca79fa85ad62ddf6c8c1d477445fae4d7c9e4d6df1866527ee167a167697301a3905260207f369d2ac9da560f5854738976c7bcd0360976fd2306a2bc809a1cb6e29ba515f5336a016cc3a1d20ada347a89d1d781c469c81ffcbafe9942afb1326975ca9e3b7b91e45b59b86bdfbf939ccafa2da3cae9316a023c69df7d14ace989eb095e2fba8fcb825ffda808ad33ccbd4d4534a212cfbef0d8be3133c439f1632956d0558ad42b7bb48e02b98a0349498f9f3fc95fba46ab428e926bcfc40371f2e5c347f1dd99e3f9ef37ee1dc4ce6daf2cfaa9b3aee6e091411953f5b80d6da16f9eeac2d0695010f56dd27e654c3e1371239fb0fe425b2039ce6b737426d53e966d62e7e59db16c166e12602437e9748759a5d99a6266645ec8ac650379b436c5241bf09f086a48b816fe422d64241f4e714f3e2ded984cc5972df2b61cd206cfc60479b906e8f903ae3a33ac694d2c908a971c9b0ae6f6e2ea407a296884b391a2f6b39513b739390b1d7199861a390a26299bf304b39d2271a9ec71a40954ebdd1ed55f18c49a1830fcb96be88132b2886542472e72c6801f6326d957e0320790a990cea7fe4cf564cd3fc44815f7f64a8048edd38b62c589619a432a642c451a767db66ee01af074290c180e1341d5e9f758eb79d6c231508ca748b15dbcf4105aaff7893e4686346e577cd71ad7723fccd6590492586a52058b231c12cdbc43e88503cb50c133612b21090056f9c0883dc9dae8866baaf028d35e2ad5d9f87d5bf56f0fe0a422c74f60d905dd3cb83c4684b00cfe451c9bbbc6c1a9561f95e5dee04a5401b69aeb758b0b05a13183f326a81da357cf460f3f32bf5409f68767b7768928272d6a27e42551f24c5b92a9094831777a59a1a27f1e1529d97b59895cc7c6bddf0aad7ac61d76e76cc62422e694d2821e675698ca196f4e842748a7bcd044b3f113998afa97a16229b8b4cbf972afca62fce538137f722dbee09532c5122d492d44cda448f5370d2591d00f04a7e8b9aa49fa6d88d6f5a2f91c9f04a486236ed9d36b3afdc07405ffa2f09722296ee862fd77baf8a749e00171a7c7c9a001d5b8215a24dd08d46cabb10c85a3a2cbae0dde539e30ef257af33bbc077a1a63bee275a2990eeda2cbd902d4a2300adb50a021bd76bd076d46a64cdba2fe17ee011cf4b2ef19211300bdc7423496dc23a5753b85065fe9b1e143389fe5db0c46cf106e3d5870646aa9c9914f2c4051d8ef8c86f6178de89f05291280ad99a8509bbf336f9fe5ac83394927eda9c88ab45f09a4a1db6d7c3949ed3c8c299ba09bba7c221691cc7783bd7a15b1dfc458da2baad3feda0523002515ba5aab7f8f8567049c0802a9ac068c67c806bfcdb917e0e750b67791b9994162106fefe464bfad53c37af627f4bf77d4aca40447ebb5963559f2ce60d617553806329a27f0d16c35586145fabcf05fd7f8bc2710b7738d377daabbbe20323998f0cc82035910acc9fe527daa49fe38bbc825b45f6694398014c52f41569fff88ce122f5228931a9627552bcd39df881d198ca779571b805a8647b77a3d3d25cd790b2ab999a87367a89db02768ea08da03c0dcafb5f4cc3abb5e662cce8e3f83c20eaa21b061b894af4d457766ed7d42e14ec6324ab44fe0dcce2a66a655da58de0dcc8a13deb616a48f16667981db7b712fb2d1b944f38ac23155c38ccc8cb3027c68554e80015815fae30056154c80a86463f3b00700c0a63f8721bed6e008c15263869377f6eb94cb7c9408a1060787325684b6e7de15a95b45109642439e1c5361d58b9fa6a9cfe4ec660239410decd22c0cd7bb34691a9075c56ceaae3f6d2a823a3d01a1d10522f3b0f62e58ca6900d02aeb12bbf5c46bdb549fecf8545bcdc93b83d56d0ceb4ec3efb65b9ea279663559c111f6170de24dd3171ae0f9c5e155487a2cd4a1b4aa24c04fa9e8d7daffaecd8548b552ba47cea04de2dd44970a3bf61274d741dd556d54ce9a684157653fb5fd0002da51260a4ce5ac94ca1d844cdd204bd04493cbe84c79a613a19b12a3a8adb854f29babee00185ac5131a570abf18885461c81ba1ba2d35961e022ebdba2e3e0d874e2c87cb9f5b3e5e0056fe0c444bc6332f452433a5f81f07f56b1bed3bf2819a8c6f38f9ce518f4293b0cef61f7163002b3a27bd9354bd584ffc18b9afb74979a8a9e91066284ffc689851bc923ec0d1711d3a21cbf95276462cf73b511ee8f1877cb4ad4a3790683a58e435e999667f70bb92cf1317c0a4f96015b5f0190ac6ffbaaf9a070b93a5d5138d252b2e464e7953dd0ac376f2d9b5edf20dbc0764524c706945f38842d9a45c0208de3112b4a538f1189e859ea6694c6aa28b4bf4eb070c96c3f3ce23365487b7674817962a2f7df4442c6ecaae56c5fea4f9a1a5578b4a4625899f748dadc6cb3c512120fc904bd257ea2035c8d4f606c0b3e4c30fc02f4870486db9582cad506d1ce6d2bdd594a4eeb91c9e20adc78948c0942ca2025aaccb897f50fd15c1f52eccf208252aa3d6b17aa9cc01724582883a12fc263281feb38a2007bfd5b851663ab10f5e748ba93f25b2a8f760cb8b01c393fe6610f83ff8f8ab0213c9a9b38bb247097cbc0311bc4f503e179b90dc9b1cc8ae0fdab5cb291156b5ddf85b35a15597c3daabec20b1d348198077012065e15f9761dfee184af472b55f0337272f0e5dd8697440215f744b53abd97586ee1b9a27d61f808c910497daf9743388ee77f957e039cafc4c1f92709c9c89e079783f2fa40d7d500b5f0d688f90ac0e78d1cd435a02af0a95ce72774e8c5c9351840774db445eeb1f3ac864cdd30fed18348a26a1642d83170bb0af11be6c624d6e1ec124e4e0e0899b4ee7bba5f9a5aa9491d8bf6eeaa626729c20ec0fb86aa3e720e5a3d019a3ee0c40bce6587d049a118f74c442d43c2ce9203e0aee927280a448395e8bfc57499b6411a94e5ed8cf4d8ac62dac352ce4f018b3f77fe496ef7d33e295ecf5fcdf0dde93d1c86a87fb0d7fc8da4a02735f7dceaf05da1014e4589f106b8394fc86d922448118c8beb3a3a230097e1910e44447e9fb8cfb73784ef74f60e628ee6c9705b38d04beaa708781199791b24f9fa8c53bd35a8ae9780782c0569be8640358b33746b02aaf0ba7be8da8f7ea87148151e61e7d82baca80351f90cb6cf5fe1d114b1baa8f64728296bb191335778aa5d86ece1a3eb1796429762daefbf077e52ee7039876d3ab650548f1a1d8250df866fc3d81a39e9e4b3ae9630ab40f2fc5e62aceb2dbf4bcc5071d75efa3708d0e420890dd5f3eb87fd59f34f48a44849aa2796bb83e008f6776060ff32feb11653a84be70d7a799647a2dc8885800b5634115c9b9741262e185590d39c2a67789d9df05174af3c20e09a6fb5c49b5fd80858e85bd2b764f9668fe85f72dd42139821aa54da4ca8146a1084102be120890465bb2a43f8626c057730c63f7e43dbdd51c4f1ee05ac6393691f44d5cdb61f65ea3332e8f2b3e0fcb5c6b43bb9a374c7134af47d18f916b3f206d960f357c8737b0ea56a4b2c928599f94d1eccb694970bc2490317d7f0caa6ddb999fc77b217fd2e301a22c2972bb0aaff8aa48100a56ca848d78ef4cea94a9556ef2e4841a60f68ce98f1c6f6b8f95eb131549dea13d34b62a462d79c339e261d4dac3aa56730fdca0ca777343a576046178a1503549b337d81b8c6fad289beaefd4b9865f4cf529b816813c2a3c399bb32e7f7252842d25812418f983c6292a27dcb0b3b745bf38831ce5045183cee8cf98769f1dbe907c1830ac1b97cfc789824e7670854a2c68042574170b0dcfb5762ea20220443eda963b2e045aa3ed600260d6f21b50a7e5baa5dc67460111dcf6c0bc5930a6637d44437483dd2036e0003f42745a91f24d78068433339c489e86a7f479c370333de5c91d00c078b985bcbf58636efdfec1e33ba205002641fe8de93f70405d522c6dea1b34ac3212a5985caea0c3429c7bae3d84960b783da140f60765d5007e730fa35a9ca58b206157091367efed58df458eb8b0107e52f5964b656883c441291a5243db9cb9d325ff52ef877e1d4d4badabc6f174f6193cc215e1b1ec5c8a77cd56b4cd7714a0444fc25e45597c53df0176e1dd01a03c18cd976abff5c0d69d97c1d564d9f0b7c273141d1042972a48bb18bf13929ddebab86d60dcaa0a099d3facbed89238d6580e76e30644360df84fa99e1089b3b12623a8d75fcbfb56be30ad67eb71ecfd6e25acbe3cdebe2b20a9bb920aecdba62e0dd4607bf774363ff14287cbd43cdd4b5d98af84bf1e23d87d6cf0de5734841d7ca1fc16398b4c1ca13d01db3c921b8f5b694a36cee49181bb99292bff089d55613394fa12f7f1e44c3eceefd62be5d4b175728e9d86ebd417c16c82f6451ff14d23725cd8ac12e911c30ec55a7d5aeb955ec6", 0x1000}, {&(0x7f0000001240)="a843cb477cb597a769cbd04762fade49a1dbc49cf8b1861d4c872fa699fb11e2e97307e9c6205d0d00b45999a100828d337d262ef0a417e30110f39142c032049d77670e34180950f4193a1464535af5ce026347876c", 0x56}, {&(0x7f00000012c0)="ce8e71f3bf29a034c1b3c1e8e915cbd489878de9368b725c8e1d67a321d7b3ded803d35c8fa58b33d9db15b1b96e40d5cc069c4bdbfb6f3b435155d72ad9b365287c8345e6c623dc3b64655a93d9a4f15379009bd0c8fdf8b913ac704a814594867d53931866e07107c17ea547dd4d6e114f17c27bdd3161d5c42f1d064b35e99d94a3a7ee8c04", 0x87}, {&(0x7f0000001380)="d171018b1fca6b7ba5ee36ffd0c3d19e34c12dfab0cadcb1a687e159d66df524b3c80fec9b7ce7d4d5ce07e43b82162de67b28e7aa4d02287ee8263c7bc450184833042ac3be8c7e360c6efc8f55f81761866cac7d6e57bd6d0191edda6c790cdede002369d9985b58fac685742eb8c9abead1d2dd76f46c2a9ce370a8417bae2a39fb63556a4ae36f22e01cb3180118688f60fdb510244ce5d242b2de525d05fe45a4c213cbac6f6d9351507c28ca9ab0798ba9260348e124ac8d7225b7f65c106869c8b86e1d95dd5ff0f0d0c01ce7233eecccaffc00ca5d06df07d5f64763b2bcfafe336bb72f55b25f", 0xeb}, {&(0x7f0000001480)="a1b429691734dabb94bd0d53a13a08520a91573a09e2f263f672f51f9e63c24436ab729d463e686a27042b29ae5422a8403d8e1318617fcd477eaebcc06da6f30f33258f04a1072ad7501f0b9ceb76bc3eaf57117a318500af35bc79fa1e2d60108ee63709300f976f02f1c4a9f5e7646db984e37db1cc6fbc7b30cad93e00c37e3c1ba3387e7d556ff722e0e21c2db7faff456182783ca8463ccf257b2c12", 0x9f}, {&(0x7f0000001540)="a7dcbf19afdd99f07c6b34c205271febdf88ec6efd696abe", 0x18}, {&(0x7f0000001580)="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", 0x1000}], 0x7, &(0x7f00000028c0)=[@cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}, @rights={{0x38, 0x1, 0x1, [r3, r0, r2, r2, r3, r2, r2, r1, r0, r1]}}, @cred={{0x1c, 0x1, 0x2, {r7, r8, r9}}}], 0x78, 0x24000004}, {&(0x7f0000002940)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002a80)=[{&(0x7f00000029c0)="fa9333c5f21c00753976e7345fc3da79b70e01a3ca8f29500093ff6b60649563d32b05f0aa8a180ab1d682b7f5ee7fe336585fc2c8962040a1f1661f29dd631d0706b5a91878564f3f7fff1eb10a8134363837e5fbcee611796a15efa1bc2078dcca52cc118a7fd1298a5a66de71a3b391b30aea3668aba02952620069798be2083eafe433d3359cb5863291ecbff338f3247cdc3b35b3ddb93178b2d39e42fa52d0bc77294847aeb0b8b61baa247c", 0xaf}], 0x1, &(0x7f0000002e80)=[@cred={{0x1c, 0x1, 0x2, {r10, r11, r12}}}, @cred={{0x1c, 0x1, 0x2, {r13, r14, r15}}}], 0x40, 0x10}, {&(0x7f0000002ec0)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000002f80)=[{&(0x7f0000002f40)="8b99f0ac", 0x4}], 0x1, 0x0, 0x0, 0x840}, {&(0x7f0000002fc0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000003480)=[{&(0x7f0000003040)="edbbc10a5a0efa6de84afb5d31c4daaaf0db4379feec843f6b5dfb814f6b085bdd86b3f0a2fb20e690ee", 0x2a}, {&(0x7f0000003080)="9b7fc52ba95a3ec37fa4a0f517", 0xd}, {&(0x7f00000030c0)="0ceb81f4b759df42659945f5cf07292c27fa6a9d94a4dab10509a1870ae942541e3ae9f06f9175f3486a34", 0x2b}, {&(0x7f0000003100)="94da105cdee6e19773830c5d4f81905369278ddb124e38256c1217604d378cd452e4ec7a3fe0be0d3de9f5a8f400a473c1014812cb928c3155673822b552b53b7b9bab180c7bd947b1a0a9adb24662702feb", 0x52}, {&(0x7f0000003180)="cb094dd4d1cfdca35ade199ca8c44d9d8ffab3f12fbfec531e4d93d9da146f7f720238071585f0680acb53e9888940ba629d955630b3d8757c1af986df1e4f6656be67bc35246e4dda1ed77e10cebb80dae84ef4d04d2bfbe322c0e2919088b524a8ea451dc97cad8f6cf0faedafcf9dbeb0b2b9e04c8639f142c454500289fea96202ba008c16c5e09708d7bf54e94e9efcbd0f895bddf095344e0648de327b9fd4cddbbfadd4efb20174fe32f6da5b61cc39e34104d2ea06aba0adfbb882ff917795a25eb97509efaae3b669900767f45677d45145eb96eaec1306e3d0ac6d77d3e28919252b", 0xe7}, {&(0x7f0000003280)="d5ec74d4e655c6e45dedcc90806964036ef29646cf95af3adfee9581490ded69df13888b9c65334676af81eff90e7897200293239e9b2ee5f50a5ab961f2b9bbb8ca357d63d7f2eefada1a114764e9a1c886c0c7b0273ff46b7e8ba5215f45a73bfef7538a56c450f0d87029ccda16e4c6b79ff0e25fa3351dc288668fdd4fc65db149a80edbe3b83c874f708c41f1e0fb82c6493ab4c32d2aff97f7b5c03d7cdbb500f9e6ea8b6f999aa2dea2793a6c50384f5a7fd70a600718", 0xba}, {&(0x7f0000003340)="c63a90917fcb23882357e24dcbc843ec404cae83c46a3a51b7e215bcdcdf62ea63d8d845ae497a7eada8ecb55922035a6b20614a0ec25512fc1e4e36b93aea8be065f116402edd3b4a021bae948e22c6b266bbfc2a0aafbed7c45759503637c50280b7984802f224b57647ad62fbf3d0ca9e41d306a1649deb9e59b389c7e23d319b4ce904ef0d627f5a3b22df0002ad62962c7dba124848f563234362133cc79a19251d6432d9d32c0086a50c28395768c1b5d62680233a555f1225c2a74ccc26b82f806f7ced8e71", 0xc9}, {&(0x7f0000003440)="4c8175b9ae2ae29f38c6b92880de1cbf510d40d9970c45ca840b07049c5259835ab2706d32da", 0x26}], 0x8, &(0x7f0000003500)=[@rights={{0x14, 0x1, 0x1, [r3]}}, @rights={{0x24, 0x1, 0x1, [r2, r0, r0, r1, r3]}}, @rights={{0x2c, 0x1, 0x1, [r3, r0, r2, r3, r0, r2, r1]}}], 0x70, 0x40000}], 0x5, 0x5a1e5f27d74059d4) setsockopt$inet_int(r3, 0x0, 0x100000000c9, 0x0, 0x45248aba) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x3f00, 0x0, 0x0, 0x42440000, 0x0) 07:32:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1227.649010][T29979] hfs: gid requires an argument 07:32:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:20 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x24) [ 1227.669850][T29979] hfs: unable to parse mount options 07:32:20 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) syz_genetlink_get_family_id$net_dm(&(0x7f0000000280)='NET_DM\x00') r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRES16=r2, @ANYBLOB="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"], 0x14c}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x0, 0x2) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000140)) r4 = syz_open_pts(r3, 0x0) dup3(r4, r3, 0x0) ppoll(&(0x7f00000001c0)=[{r4}, {r3}], 0x2, 0x0, 0x0, 0x0) [ 1227.726201][T29987] hfs: can't find a HFS filesystem on dev loop1 07:32:20 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) r2 = dup2(r1, r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xe8) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=@deltfilter={0x34, 0x2d, 0xf3c9a4ae5293a3e6, 0x70bd2a, 0x25dfdbff, {0x0, r3, {0xffff, 0xf}, {0xc, 0x9}, {0x10, 0x7}}, [@TCA_RATE={0x8, 0x5, {0x7fff, 0xcc9}}, @TCA_CHAIN={0x8, 0xb, 0x9}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000800}, 0x20008000) 07:32:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x4000, 0x0, 0x0, 0x42440000, 0x0) 07:32:20 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) [ 1227.884406][T30001] hfs: gid requires an argument [ 1227.889285][T30001] hfs: unable to parse mount options [ 1227.892347][T29995] hfs: can't find a HFS filesystem on dev loop0 07:32:21 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs ', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:21 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000040)={0x2, [0x0, 0x0]}, &(0x7f00000000c0)=0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:21 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x200201, 0x0) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000040)={0x7ff, 0xfffffffffffffeff, 0x3, 0x2, 0x4, "9086532a16ad85f1d00b612ab7ebedf09e2d90", 0x6, 0x7}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)) r3 = syz_open_pts(r2, 0x0) dup3(r3, r2, 0x0) ppoll(&(0x7f00000000c0)=[{r3}, {r2}], 0x1b8, 0x0, 0x0, 0x0) 07:32:21 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x9a05, 0x1, &(0x7f0000000140)=[{&(0x7f00000001c0)="1afd3f6cfba3f3cfae0d80329ba3e2650d0f77dc1d21c090bb93aaa4e9e177cf68ef5a93de1834ee81aa10e67ef601d2535fcbdec43b199522a14dd0626633114747b89626e336d01aa6cfb7e5cb1443712e5e3ce586a6a76ac34f0827c74f5f8989eed2f690a7dd2121f69ae4f7792f6283b345fe9fe79dc01dfe1ef43db33b09162befbee8563afe641fe82fca36ca0048573c9068b03cb61e49b40536b35b74e9c4b2a470e1ce4677df5ac4d6b5289c53f7a350b1127f7375f39e0dd82559d6b7b4b89328272dcb76bf4a41f4c1ec47d7021001105a3d267d", 0xda}], 0x880, &(0x7f0000000380)={[{@quota='quota'}, {@grpquota='grpquota'}, {@mtpt='mtpt'}, {@swidth={'swidth', 0x3d, 0x4}}, {@prjquota='prjquota'}, {@logbufs={'logbufs', 0x3d, 0x4}}, {@gqnoenforce='gqnoenforce'}, {@noquota='noquota'}], [{@pcr={'pcr', 0x3d, 0x8}}, {@seclabel='seclabel'}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@dont_measure='dont_measure'}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@uid_gt={'uid>', r1}}]}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='Z\x00') r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x280000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x400020000002) ioctl$VIDIOC_SUBSCRIBE_EVENT(r2, 0x4020565a, &(0x7f0000000040)={0x5, 0x7, 0x3}) 07:32:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1228.253202][T30019] hfs: can't find a HFS filesystem on dev loop1 07:32:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs ', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x4042, 0x0, 0x0, 0x42440000, 0x0) [ 1228.310328][T30050] hfs: gid requires an argument [ 1228.329232][T30050] hfs: unable to parse mount options 07:32:21 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7fffffff, 0x8000) ioctl$SIOCAX25DELFWD(r2, 0x89eb, &(0x7f0000000040)={@default, @bcast}) r3 = syz_open_pts(r1, 0x0) dup3(r3, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r3}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:32:21 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x8200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xfffffffffffffffc, @rand_addr="331323241b40417310842ed423d1e24b", 0x9}, {0xa, 0x4e21, 0x0, @empty, 0x5df}, r2}}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000140)) r4 = syz_open_pts(r3, 0x0) dup3(r4, r0, 0x0) ppoll(&(0x7f00000001c0)=[{r4}, {r3}], 0x2, 0x0, 0x0, 0x0) [ 1228.438892][T30239] hfs: gid requires an argument [ 1228.444542][T30133] XFS (loop3): unknown mount option [mtpt]. [ 1228.450961][T30239] hfs: unable to parse mount options [ 1228.473180][T30231] hfs: can't find a HFS filesystem on dev loop0 07:32:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs ', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x10', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x4800, 0x0, 0x0, 0x42440000, 0x0) 07:32:21 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x200200, 0x0) read$rfkill(r0, &(0x7f0000000040), 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x4, 0x325200) write$P9_RATTACH(r1, &(0x7f0000000040)={0x14, 0x69, 0x2, {0x40, 0x2, 0x5}}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xf400000) prctl$PR_CAPBSET_DROP(0x18, 0x23) 07:32:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x4c00, 0x0, 0x0, 0x42440000, 0x0) 07:32:22 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e24, @local}}, 0x2, 0x3}, &(0x7f0000000300)=0x90) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000400)={r2, 0xb4, &(0x7f0000000340)=[@in6={0xa, 0x4e23, 0x0, @mcast1, 0x5}, @in={0x2, 0x6, @loopback}, @in={0x2, 0x4e22, @local}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x21}}, @in={0x2, 0x4e23, @empty}, @in6={0xa, 0x4e24, 0x9, @loopback, 0x20}, @in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e22, 0x4, @loopback, 0xffffffffffffabcd}, @in={0x2, 0x4e23, @remote}]}, &(0x7f0000000440)=0x10) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x4, 0x101402) sendmsg$nl_crypto(r3, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40200220}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=@del={0xe8, 0x11, 0x4, 0x70bd25, 0x25dfdbff, {{'drbg_pr_hmac_sha512\x00'}, [], [], 0x2000, 0x400}, [{0x8, 0x1, 0x100000001}]}, 0xe8}, 0x1, 0x0, 0x0, 0x80}, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1229.193595][T30282] hfs: can't find a HFS filesystem on dev loop1 07:32:22 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0xd1) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000040)={0x7, 0xfffffffffffffffe}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$isdn(0x22, 0x3, 0x1) ioctl$VIDIOC_G_AUDIO(r0, 0x80345621, &(0x7f00000000c0)) prctl$PR_CAPBSET_DROP(0x18, 0x0) syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x7fffffff, 0x44002) [ 1229.336311][T30296] hfs: can't find a HFS filesystem on dev loop0 [ 1229.372752][T30291] hfs: gid requires an argument [ 1229.389791][T30291] hfs: unable to parse mount options 07:32:22 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x40000, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)) r3 = syz_open_pts(r2, 0x0) dup3(r3, r2, 0x0) ppoll(&(0x7f00000001c0)=[{r3}, {r2}], 0x2, 0x0, 0x0, 0x0) 07:32:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x6800, 0x0, 0x0, 0x42440000, 0x0) 07:32:22 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x0, 0x0) bind$vsock_dgram(r1, &(0x7f00000001c0)={0x28, 0x0, 0x0, @my=0x0}, 0xffffffffffffff0f) ioctl$KVM_PPC_GET_SMMU_INFO(r1, 0x8250aea6, &(0x7f0000000100)=""/121) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80000, 0x0) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f0000000040)={0x4000000000000000, 0x5000, 0x5, 0x8, 0x1d}) ioctl$SIOCRSACCEPT(r2, 0x89e3) 07:32:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x10', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1229.565705][T30405] hfs: gid requires an argument [ 1229.570593][T30405] hfs: unable to parse mount options [ 1229.591538][T30404] Unknown ioctl -2108641626 [ 1229.630639][T30404] Unknown ioctl -2108641626 07:32:22 executing program 3: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video0\x00', 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x10800, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000100)={0xaf94c220f1c9ad2f, 0x9, 0x8001, 0x800, r1}) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x10', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:22 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xd9, 0x800) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f00000000c0)) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:32:22 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x2, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x6) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) ioprio_set$uid(0x3, r1, 0x20) prctl$PR_CAPBSET_DROP(0x18, 0x0) [ 1229.755022][T30415] hfs: can't find a HFS filesystem on dev loop0 [ 1229.806673][T30524] hfs: can't find a HFS filesystem on dev loop1 07:32:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x6c00, 0x0, 0x0, 0x42440000, 0x0) 07:32:22 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000140)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) ppoll(&(0x7f00000001c0)=[{r1}, {}], 0x2, 0x0, 0x0, 0x0) 07:32:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:23 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x2, 0x400) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000240)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'L-', 0x4}, 0x28, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20000, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_DEL(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x64, r3, 0x4, 0x70bd2d, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e20}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_PEER_V4={0x8, 0x8, @remote}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @rand_addr="e7f5dab0b8e93a0007088d7602e4e2ce"}, @FOU_ATTR_PORT={0x8, 0x1, 0x393}, @FOU_ATTR_PEER_V6={0x14, 0x9, @remote}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x880) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x400000, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x0) statx(r2, &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000000340)) 07:32:23 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x1f) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x38101, 0x0) ioctl$VFIO_SET_IOMMU(r1, 0x3b66, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="0600"/32]) 07:32:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x7400, 0x0, 0x0, 0x42440000, 0x0) 07:32:23 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000040), &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000180)={'IDLETIMER\x00'}, &(0x7f00000001c0)=0x1e) [ 1230.142951][T30649] hfs: can't find a HFS filesystem on dev loop0 [ 1230.158466][T30654] hfs: can't find a HFS filesystem on dev loop1 07:32:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfsD', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1230.356093][T30666] hfs: gid requires an argument [ 1230.360969][T30666] hfs: unable to parse mount options 07:32:23 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000000c0)="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") 07:32:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x7a00, 0x0, 0x0, 0x42440000, 0x0) [ 1230.531658][T30686] hfs: gid requires an argument [ 1230.536923][T30681] hfs: can't find a HFS filesystem on dev loop1 [ 1230.543422][T30686] hfs: unable to parse mount options 07:32:23 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fc) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x3, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) 07:32:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfsB', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:23 executing program 3: r0 = semget$private(0x0, 0x1, 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x200, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20\x00', 0x8000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x40c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0xffffffff) prctl$PR_CAPBSET_DROP(0x18, 0xd) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="23000000420081aee405e9a4000000000000c6ff07d800400300"/35, 0x23}], 0x1}, 0x0) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000001a00)={"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"}) recvmsg$kcm(r3, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)=""/101, 0x65}, {0x0}, {&(0x7f0000000300)=""/4096, 0x1000}], 0x3}, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={0x0}}, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r4, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) prctl$PR_CAP_AMBIENT(0x2f, 0x4e86a1c803678ca7, 0x16) io_setup(0x9, &(0x7f0000000100)=0x0) io_pgetevents(r5, 0x7, 0x3d0b751150123857, 0x0, 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x2, 0x0) 07:32:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfsD', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0xff00, 0x0, 0x0, 0x42440000, 0x0) [ 1231.023484][T30805] hfs: gid requires an argument [ 1231.028369][T30805] hfs: unable to parse mount options 07:32:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfsB', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:24 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)) r3 = syz_open_pts(r2, 0x0) dup3(r0, r2, 0x72ecca94572a26a0) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000000)) ppoll(&(0x7f00000001c0)=[{r3}, {r2}], 0x2, 0x0, 0x0, 0x0) 07:32:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x400000, 0x0, 0x0, 0x42440000, 0x0) 07:32:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1231.130804][T30918] hfs: gid requires an argument [ 1231.138020][T30918] hfs: unable to parse mount options 07:32:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) [ 1231.263231][T30924] hfs: can't find a HFS filesystem on dev loop0 07:32:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1231.423649][T30934] hfs: gid requires an argument [ 1231.443125][T30934] hfs: unable to parse mount options 07:32:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x1000000, 0x0, 0x0, 0x42440000, 0x0) [ 1231.537019][T30940] hfs: can't find a HFS filesystem on dev loop0 [ 1231.548264][T30943] hfs: gid requires an argument [ 1231.562013][T30943] hfs: unable to parse mount options [ 1231.675467][T30946] hfs: can't find a HFS filesystem on dev loop1 07:32:24 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x100000000, 0x400400) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f00000000c0)={0x5, 0x0, [{0x40000001, 0x8, 0x9, 0x7fff, 0x7}, {0x80000008, 0x8, 0x7f, 0x200, 0x1}, {0xc0000007, 0x2, 0x101, 0x80000001, 0x6}, {0x4, 0x3f, 0x2, 0x0, 0x9}, {0x2, 0x2, 0x2a1a, 0x401, 0x7fffffff}]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfsP', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x2000000, 0x0, 0x0, 0x42440000, 0x0) [ 1231.943005][T30959] hfs: gid requires an argument [ 1231.948124][T30959] hfs: unable to parse mount options [ 1231.953752][T30960] hfs: can't find a HFS filesystem on dev loop1 [ 1232.093741][T31050] hfs: gid requires an argument [ 1232.098621][T31050] hfs: unable to parse mount options 07:32:25 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_FPEMU(0xa, 0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:32:25 executing program 3: socketpair$unix(0x1, 0x6cf54a69cfce17d5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x5, 0x2000) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f00000001c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@mcast1, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in6=@mcast1}}, &(0x7f0000000180)=0xe8) 07:32:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfsM', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x3000000, 0x0, 0x0, 0x42440000, 0x0) 07:32:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfsP', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:25 executing program 3: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1f, 0x305804) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0xce8, 0x7, 0x2000}, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 07:32:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:25 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x11c00200}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x24, r4, 0x1, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) setsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f0000000000)=0x740, 0x2) r5 = getpgrp(0x0) migrate_pages(r5, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) 07:32:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfsT', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:25 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x501000, 0x0) getpid() ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f00000000c0)={0xad, 0x7, 0x200, 0x700}) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x6fa719aef790527e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x1) prctl$PR_CAPBSET_DROP(0x18, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') [ 1232.309828][T31165] hfs: gid requires an argument [ 1232.327200][T31165] hfs: unable to parse mount options 07:32:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x4000000, 0x0, 0x0, 0x42440000, 0x0) 07:32:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfsM', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1232.475089][T31204] hfs: gid requires an argument [ 1232.479972][T31204] hfs: unable to parse mount options 07:32:25 executing program 3: modify_ldt$read(0x0, &(0x7f0000000180)=""/130, 0x25) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = fcntl$dupfd(r1, 0x406, r0) ioctl$UI_BEGIN_FF_ERASE(r2, 0xc00c55ca, &(0x7f0000000000)={0xf, 0x8, 0x8}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x1, 0x30, 0xfff, 0x100}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000240)={r3, @in={{0x2, 0x4e22, @broadcast}}}, &(0x7f0000000140)=0x84) write$P9_RMKDIR(r2, &(0x7f0000000040)={0x14, 0x49, 0x5, {0x26, 0x4, 0x5}}, 0xfffffffffffffe89) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:25 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fchdir(r0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)) r3 = syz_open_pts(r2, 0x0) dup3(r3, r2, 0x0) ppoll(&(0x7f00000001c0)=[{r3}, {r2}], 0x2, 0x0, 0x0, 0x0) 07:32:25 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_GET_THP_DISABLE(0x2a) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfsS', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfsT', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x5000000, 0x0, 0x0, 0x42440000, 0x0) 07:32:25 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x9, 0x40) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) [ 1232.732188][T31325] hfs: gid requires an argument [ 1232.750365][T31325] hfs: unable to parse mount options 07:32:25 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x80, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x101000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) [ 1232.830593][T31440] hfs: gid requires an argument [ 1232.852305][T31440] hfs: unable to parse mount options 07:32:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:25 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x140, 0x0) ioctl$MON_IOCX_GET(r2, 0x40189206, &(0x7f00000000c0)={&(0x7f0000000040), &(0x7f0000000200)=""/238, 0xee}) mq_timedsend(r2, &(0x7f00000003c0)="c9efab38d88cf1a5e7c930fc69f47fa1c5f8a3c6b46fa766c62e889621ef3ff63ff7f107ce90b1b64b01b6ff1670b94ceb13a03606d8f944b990e27288907290cfd1ecc05a7ac22332b2a12ce2c853f00e3907d5ab7a74b8f9c85caf3f001d179b416941dd75bdb6ef03c5f008dcd40ec5629e4a37f46e2b03936cef0721133bd6ee8f0d4bbedd2ad9632196badd189a81b06d41f9eccfad5d5de33f0f670e675cd92d37fba6d19a1394f0d10fe366c287351ed2b8af1451a293163c88d29ca797a252ed6228c07b2665b137f7be2b06b49e4bbf68", 0xd5, 0x0, &(0x7f0000000000)={0x77359400}) munlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r3 = syz_open_pts(r1, 0x0) r4 = dup3(r3, r1, 0x0) dup3(r4, r0, 0x80000) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000100)=0x7, 0x4) ppoll(&(0x7f00000001c0)=[{r3}, {r1}], 0x2, 0x0, 0x0, 0x0) ioctl$TCXONC(r3, 0x540a, 0x9) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, &(0x7f0000000340)={0xa, 0x9, {0x0, 0x1, 0xee0b, {0x8001, 0x4}, {0x6, 0x7f}, @ramp={0x8ffe, 0x3, {0xd4, 0x0, 0x0, 0x1}}}, {0x52, 0x6, 0x8, {0x800, 0x4}, {0x0, 0xf0}, @ramp={0x0, 0x101, {0x800, 0xd8, 0x3ff80000000, 0x1}}}}) 07:32:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfsS', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:26 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0x64a355bd72106297) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000040)=0x4) 07:32:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x6000000, 0x0, 0x0, 0x42440000, 0x0) 07:32:26 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet_sctp(0x2, 0x1, 0x84) prctl$PR_CAPBSET_DROP(0x18, 0x0) [ 1233.127033][T31461] hfs: gid requires an argument [ 1233.141754][T31461] hfs: unable to parse mount options [ 1233.204754][T31565] hfs: can't find a HFS filesystem on dev loop0 [ 1233.216501][T31572] hfs: gid requires an argument [ 1233.225913][T31572] hfs: unable to parse mount options 07:32:26 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x4000, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000040)) 07:32:26 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x101400) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:32:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:26 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x301000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x82f4) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:26 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r3, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e22, 0x5, @local, 0xfffffffffffffff8}, {0xa, 0x4e20, 0x7, @empty, 0x367b}, 0x5, [0x8001, 0x3, 0x4, 0x3, 0x0, 0x80000001, 0xe83, 0x6]}, 0x5c) 07:32:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x7000000, 0x0, 0x0, 0x42440000, 0x0) 07:32:26 executing program 3: syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) [ 1233.525839][T31711] hfs: can't find a HFS filesystem on dev loop1 [ 1233.529209][T31753] hfs: gid requires an argument [ 1233.537638][T31753] hfs: unable to parse mount options [ 1233.545006][T31759] hfs: can't find a HFS filesystem on dev loop0 07:32:26 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)) r3 = syz_open_pts(r2, 0x0) dup3(r0, r0, 0x81b86dda1c0eed46) ppoll(&(0x7f00000001c0)=[{r3}, {r2}], 0x2, 0x0, 0x0, 0x0) 07:32:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1233.723821][T31911] hfs: gid requires an argument [ 1233.728702][T31911] hfs: unable to parse mount options 07:32:26 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socket$alg(0x26, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x82040) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000100)={{{@in=@empty, @in6}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, 'vboxnet1@'}], 0xa, "a5d77f0035eb69ba9bab129a6400128fed783f29259a3c6377fe68ec327be11fee5e10d24e2d4e71add4501ba45dd9b072fd98739db4012a5067623fd246b7231179e88d727b5e721ef672c5195c509c6f66a878fcdf7901ddc28e133ec9188e7d219a65121da5baf79ccf94df0789f80d3455255be4b14b2df22627e3823ab6680421146d4e76025e5a4d8a79615ad4c87b3ea8b18d4615c9b4c9279ff89317b5b08fcdb3678b0f89bff686699ca57f571d394437faa767acde7d5fa0ef2c00c2de66678be1ac0e46bce7"}, 0xe0) prctl$PR_CAPBSET_DROP(0x18, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000040)=0x1) 07:32:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:27 executing program 3: socket$kcm(0x2b, 0x1, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x91c6, 0x101000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x7, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x4, 0xae, &(0x7f00000000c0)=""/174, 0x0, 0x7, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x1c) 07:32:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x8000000, 0x0, 0x0, 0x42440000, 0x0) [ 1233.955127][T31923] hfs: can't find a HFS filesystem on dev loop0 [ 1233.973836][T31922] hfs: can't find a HFS filesystem on dev loop1 07:32:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1234.074365][T31932] hfs: gid requires an argument [ 1234.093314][T31932] hfs: unable to parse mount options 07:32:27 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @multicast2}, &(0x7f0000000140)=0x10) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000180)={0x3}, 0x4) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x10000000, 0x0, 0x0, 0x42440000, 0x0) 07:32:27 executing program 3: r0 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@mcast2, @in6=@empty, 0x4e23, 0x8e52, 0x4e21, 0xf63d, 0xa, 0xa0, 0x20, 0x4, r1, r2}, {0x1, 0x8, 0x0, 0x1ff, 0x8, 0x6df, 0x1}, {0xfffffffffffffffc, 0x4258, 0x2, 0x3ff}, 0x4, 0x6e6bb1, 0x1, 0x0, 0x2}, {{@in=@broadcast, 0x4d5, 0x2b}, 0xa, @in=@broadcast, 0x3502, 0x3, 0x0, 0x101, 0x0, 0x3000000, 0x2}}, 0xe8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$FICLONERANGE(r4, 0x4020940d, &(0x7f0000000040)={r3, 0x0, 0x4, 0x0, 0x7}) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x62ff4162c96bb4a5, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x0) [ 1234.264053][T31953] hfs: gid requires an argument [ 1234.269066][T31953] hfs: unable to parse mount options [ 1234.270133][T31943] hfs: can't find a HFS filesystem on dev loop0 [ 1234.289603][T31945] hfs: can't find a HFS filesystem on dev loop1 07:32:27 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x1ca5}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={r2, 0x1}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000140)) r4 = syz_open_pts(r3, 0x0) dup3(r4, r3, 0x0) ppoll(&(0x7f00000001c0)=[{r4}, {r3}], 0x2, 0x0, 0x0, 0x0) write$rfkill(r1, &(0x7f0000000200)={0x7, 0x2, 0x2, 0x0, 0x1}, 0x8) 07:32:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\xc0', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:27 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x17) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) ptrace$getenv(0x4201, r2, 0x4, &(0x7f0000000040)) 07:32:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x1f000000, 0x0, 0x0, 0x42440000, 0x0) 07:32:27 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) getpeername$netrom(r1, &(0x7f00000000c0)={{0x3, @default}, [@netrom, @bcast, @bcast, @default, @default, @null]}, &(0x7f0000000040)=0x48) [ 1234.684937][T32071] hfs: can't find a HFS filesystem on dev loop1 07:32:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:32:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1234.765976][T32066] hfs: can't find a HFS filesystem on dev loop0 07:32:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\xc0', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1234.909147][T32187] hfs: can't find a HFS filesystem on dev loop1 07:32:28 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x80000000, 0x101040) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x80000, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r2, 0xc0585605, &(0x7f0000000100)={0x1, 0x0, {0x5, 0xffffffff00000001, 0x3008, 0x1, 0xf, 0x7, 0x1, 0x2}}) getsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x4) prctl$PR_CAPBSET_DROP(0x18, 0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7ff, 0x400000) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f0000000040)='^,.^\x00') 07:32:28 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000040), 0x4) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) ioctl$KVM_CHECK_EXTENSION(r2, 0xae03, 0x1) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000140)) r4 = syz_open_pts(r3, 0x0) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000003c0)={'team0\x00', 0x0}) sendmsg$FOU_CMD_GET(r2, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2200000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x2c, r5, 0x4, 0x70bd27, 0x25dfdbff, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r6}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e20}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x2c}, 0x1, 0x0, 0x0, 0x3b7b98615b91bc8f}, 0x0) dup3(r4, r3, 0x0) ppoll(&(0x7f00000001c0)=[{r4}, {r3}], 0x2, 0x0, 0x0, 0x0) 07:32:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x20000000, 0x0, 0x0, 0x42440000, 0x0) 07:32:28 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) timerfd_gettime(r1, &(0x7f0000000040)) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\xc0', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:28 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:32:28 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000040)={0x9d0000, 0x1, 0x6, [], &(0x7f0000000000)={0x9909d4, 0x4, [], @value64=0x7}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x100000005) prctl$PR_CAPBSET_DROP(0x18, 0x13) 07:32:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1235.223137][T32312] hfs: gid requires an argument [ 1235.228023][T32312] hfs: unable to parse mount options 07:32:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x20100000, 0x0, 0x0, 0x42440000, 0x0) 07:32:28 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000040)={0x40}) open(&(0x7f0000000100)='./file0\x00', 0x900, 0x12) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) prctl$PR_CAPBSET_DROP(0x18, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f00000000c0)={@local, @dev={0xac, 0x14, 0x14, 0x14}, @empty}, 0xc) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f0000000140), 0x4) 07:32:28 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x40000) r3 = dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000040)=0x18) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f00000000c0)={0x40000000000, 0x1, 0x6, 0x0, r4}, &(0x7f0000000100)=0x10) 07:32:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x02', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) [ 1235.428670][T32430] hfs: can't find a HFS filesystem on dev loop0 07:32:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:28 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) r1 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r1) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7, 0x260000) ioctl$VHOST_VSOCK_SET_RUNNING(r2, 0x4004af61, &(0x7f0000000040)=0x1) 07:32:28 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x660c) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000280)={0x6a33ad35, {{0x2, 0x4e22, @multicast2}}, 0x1, 0x2, [{{0x2, 0x4e24, @remote}}, {{0x2, 0x4e23, @multicast1}}]}, 0x190) getsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000040), &(0x7f0000000080)=0x9) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x8001, 0x3, [0x4, 0x3, 0xfffffffffffffc01]}, &(0x7f0000000440)=0xe) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000200)={0x2d1, 0x4, 0x8008, 0x3, 0xcb2, 0x81, 0xffffffffffff5256, 0x7a, r3}, &(0x7f0000000240)=0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x3) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) r5 = syz_open_pts(r4, 0x0) dup3(r0, r4, 0x80000) ppoll(&(0x7f00000001c0)=[{r5}, {r4}], 0x2, 0x0, 0x0, 0x0) 07:32:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x0f', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$alg(0x26, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x1e) 07:32:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x280f0000, 0x0, 0x0, 0x42440000, 0x0) [ 1235.654801][ T26] audit: type=1804 audit(1565508748.708:61): pid=32551 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir729802777/syzkaller.4wGNrc/2110/bus" dev="sda1" ino=16622 res=1 [ 1235.741158][T32547] hfs: can't find a HFS filesystem on dev loop1 07:32:28 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x1f) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x64af, 0xfffffffffffffffb, 0x0, 0x7, 0xffffffffffffffbf, 0x898}) 07:32:28 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000000)) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:32:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x0f', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:29 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x9, 0x2000) io_uring_register$IORING_UNREGISTER_EVENTFD(r1, 0x5, 0x0, 0x0) ioctl$RTC_AIE_OFF(r1, 0x7002) 07:32:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x3f000000, 0x0, 0x0, 0x42440000, 0x0) [ 1235.996932][T32678] hfs: gid requires an argument [ 1235.998688][T32676] hfs: can't find a HFS filesystem on dev loop0 [ 1236.033896][T32678] hfs: unable to parse mount options 07:32:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) fgetxattr(r1, &(0x7f0000000000)=@random={'osx.', '/dev/ptmx\x00'}, &(0x7f0000000040)=""/25, 0x19) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:32:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:29 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='anon_inodefs\x00', 0x82, &(0x7f0000000100)='trusted\'self\'\x00') dup2(r0, r0) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000040)=0x1) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)) r4 = syz_open_pts(r2, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x3}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000200)={r5, 0x4c2b}, 0x8) dup3(r4, r2, 0x0) ppoll(&(0x7f0000000240)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 07:32:29 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80000) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f00000000c0)={[{0x0, 0x80000000, 0x4, 0x1, 0xffff, 0x8, 0x6, 0x2, 0x40, 0x800, 0x8, 0x2, 0xad}, {0x8000, 0xcf1e, 0x100, 0x3, 0x4, 0x0, 0x100000001, 0x7ff, 0x2, 0x1, 0x7, 0x5, 0x7fffffff}, {0xb26, 0x8, 0x7, 0xfffffffffffffd9a, 0x1, 0x6, 0xfffffffffffffffd, 0x5, 0x7, 0x9, 0x8, 0xb27, 0x72b}], 0xe1}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x40000000, 0x0, 0x0, 0x42440000, 0x0) [ 1236.309077][ T427] hfs: can't find a HFS filesystem on dev loop0 07:32:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1236.405839][ T438] hfs: can't find a HFS filesystem on dev loop1 07:32:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) ftruncate(r0, 0x9) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:32:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1236.553092][ T459] hfs: gid requires an argument 07:32:29 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @empty}, &(0x7f00000000c0)=0xc) [ 1236.574059][ T459] hfs: unable to parse mount options 07:32:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x42400000, 0x0, 0x0, 0x42440000, 0x0) 07:32:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r2 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x22b, 0x230000) ioctl$RTC_EPOCH_SET(r2, 0x4008700e, 0x4) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000100)={0x33, @empty, 0x4e22, 0x0, 'wlc\x00', 0x1, 0x800, 0x27}, 0x2c) r3 = syz_open_pts(r1, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x8900, 0x0) ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000040)) dup3(r3, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r3}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:32:29 executing program 3: socketpair(0x5, 0x80000, 0xe98, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000440)={{{@in=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000540)=0xb5) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x2000030, &(0x7f0000000200)={[{@xino_on='xino=on'}, {@index_off='index=off'}, {@nfs_export_on='nfs_export=on'}, {@index_off='index=off'}, {@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}, {@index_on='index=on'}, {@nfs_export_on='nfs_export=on'}, {@default_permissions='default_permissions'}], [{@dont_hash='dont_hash'}, {@appraise='appraise'}, {@smackfshat={'smackfshat', 0x3d, 'GPL-ð0:'}}, {@uid_eq={'uid', 0x3d, r1}}]}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) connect$rds(r2, &(0x7f0000000300)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x22}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) [ 1236.700553][ T555] hfs: can't find a HFS filesystem on dev loop0 [ 1236.707725][ T559] hfs: can't find a HFS filesystem on dev loop1 [ 1236.727994][ T657] hfs: gid requires an argument [ 1236.744305][ T657] hfs: unable to parse mount options 07:32:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:30 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = msgget(0x3, 0x6) msgctl$IPC_RMID(r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x86080, 0x0) r3 = syz_open_pts(r2, 0x0) r4 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x7, 0x40) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14, 0x80000) bind$can_raw(r4, &(0x7f00000002c0)={0x1d, r5}, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x2000, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000040)=0x5) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000000)=0x10001) dup3(r3, r2, 0x0) ppoll(&(0x7f0000000300)=[{r3, 0x4}], 0x20000000000001cf, 0x0, 0x0, 0xfffffffffffffd97) 07:32:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) futex(&(0x7f0000000000), 0x9, 0x1, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)=0x1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0xfffffffffffffffb) 07:32:30 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x400, 0x402000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000000)=0xffffffff) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) [ 1236.989607][ T676] hfs: can't find a HFS filesystem on dev loop0 07:32:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x48000000, 0x0, 0x0, 0x42440000, 0x0) 07:32:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/netstat\x00') r0 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x5, 0x8000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x800000003eb0) prctl$PR_CAPBSET_DROP(0x18, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x8000, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @remote, 'syzkaller0\x00'}}, 0x1e) [ 1237.173467][ T687] hfs: can't find a HFS filesystem on dev loop1 [ 1237.194114][ T698] hfs: gid requires an argument [ 1237.202607][ T698] hfs: unable to parse mount options 07:32:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:30 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x20000, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) fcntl$setstatus(r0, 0x4, 0x400) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x7, 0x20, 0x4e, 0x400000000000000, 0x11, 0x100000000, 0x1000, 0x3, 0xc060, 0x5, 0xff, 0x7fff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r3 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x3, 0x180) ioctl$DRM_IOCTL_INFO_BUFS(r3, 0xc0106418, &(0x7f0000000180)={0x5, 0x2, 0x9b, 0x7f, 0x4, 0x7ff}) [ 1237.307563][ T807] hfs: gid requires an argument [ 1237.320508][ T807] hfs: unable to parse mount options [ 1237.320953][ T751] hfs: can't find a HFS filesystem on dev loop0 07:32:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x800) syz_mount_image$nfs4(&(0x7f0000000280)='nfs4\x00', &(0x7f00000002c0)='./file0\x00', 0x3ff, 0x7, &(0x7f0000000840)=[{&(0x7f0000000300)="be00843855b3d7fa4e5a84d2589742be22bfb526db42591c34ab0e6e51fde0b3f25197232ad319e954e91e437da2c50ff5e5c08523fe5c87919659792b47b702abd0ea5e9a2a73afe40b2c365740d5b67ed5a7f5ef26f879aa04eca922036df1495b4866544df4336150a1e9b243364a707178d99176479591d091fe9c395df0de9950b2ef6c6fdf4a33b8b39dcf7f65239a69611813b2d45b7286a7c2d3d89945e35da0826a0c0ba593b0fac6f5c89239634b899d6faecad12004d32053c3153421dbd601f8924c338ad9b6549222df441ff619", 0xd4, 0x3}, {&(0x7f0000000400)="d86b1501ff90f1d47d68ba026c3651a87680b4686e00c3ffd104e4e87f8399c82e104e5ae6b6d5d585f487a1823e1a99a111602d807ef575ebabb9493d9e3db9f462f0667efcb61c08f6f6be7570c31effab5a6fef16b9748ea9848ca288164a72904012e7120bfac5ab3bd2a81574cd48e3e0be6b11ff1409f889acc5d1225dc9058095", 0x84, 0x1000}, {&(0x7f00000004c0)="1035e3c02e8335c34ff4e7923f876db6cd795b9f94188dccda3042cbb0b17eab244abe994e882b48a3b5679b2f4013c6fd7b283ba6aa1f9732c48145ab087f4ebc48baf40a9aa0ce811a9b52819e026e99b6c25ec1ef3c09a00e287b9c7eb9a7d88dc126b32c97661c2240bad6108ecddb8fdf4949882e890c50757dbdc6eefe1a48c93faf001b746d6dec98bc1e6322834ba1a2186c235da581c89c", 0x9c, 0xffff}, {&(0x7f0000000580)="bc6e12fe3bc45615ca28544eff610986ec80ee9d4b5a3f89d247569be89374d0a0d2d95d561e44573df6883acc3c57867bd8e949e48eee09acb62bc459fbab5b8b942769ac14a3fac76b4fbbcfd401bd11b47c6c953769bdcf83fa2056f5b560483fb80f4b589030688d3b471fa334be0f372814e71711665970c2a0ecbcd8425a2783b19ab566ca0d380f427dc3e9e1", 0x90, 0x8}, {&(0x7f0000000640)="c5a2", 0x2, 0x754}, {&(0x7f0000000680)="6ddab9716ca4822953a9f1ddf7778ce929ca81ef9f76d263be3aa075a1f839ad7a18e8baf2e3134b776a8c5d60101c75006cd4302645efd90093437c19c9ed522375b18e916f9b4a70a0f08c1387996158ca0e6f03c92908b633466897e0fe5dc0f10b660bfa06ea333c1842a854d2a333d912c54ea8165cdf28b6b69ba8ccc50d9464501f8af0e48820c1fe89d29f62ca32d487fe59a92dd9e342bd0cef", 0x9e, 0x6}, {&(0x7f0000000740)="f12c39c48d870cfab5714afc3f32082a9c4aaa695570e662eb913271e280e323060d2238d94a57a5c6c63c6f2c544e86eedefdff651f4f8e2dff4ee28975c195f3fbf9d8ea5e4d1955423a8fac6061a19cb64e830fc6a7ca9f719bd72c980b8b7268c11a2ff3b70012cbf7d022c7c8e37240925f366a20612d3bdcde105dc0770d2d9fdc1ada358d2fc413ddbde4986b708f37953603dae58c58bf2a680704703a0ced5429cfea2739601f16a4ba5d9710be57932b94fa27b3561b7bf31d8f0d0537c2bf79920757d4ea9f6be96ca8e4c5a1df", 0xd3, 0x8}], 0x800004, &(0x7f0000000900)='/dev/snd/pcmC#D#p\x00') recvfrom$netrom(r2, &(0x7f0000000180)=""/24, 0x18, 0x0, &(0x7f00000001c0)={{0x3, @null, 0x4}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x2874, 0x800) ioctl$BINDER_GET_NODE_DEBUG_INFO(r3, 0xc018620b, &(0x7f0000000100)={0x2}) prctl$PR_GET_FP_MODE(0x2e) pread64(r0, &(0x7f0000000000)=""/68, 0x44, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x0) setsockopt$inet_mreqsrc(r3, 0x0, 0x26, &(0x7f0000000240)={@empty, @multicast1, @rand_addr=0x5}, 0xc) 07:32:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x4000, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000340)='bbr\x00', 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000140)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, r2, 0x0, 0x9, &(0x7f0000000440)='/dev/dsp\x00'}, 0x30) fcntl$setownex(r0, 0xf, &(0x7f0000000400)={0x0, r4}) r5 = syz_open_pts(r3, 0x0) r6 = dup3(r5, r3, 0x0) ioctl$TIOCSSERIAL(r6, 0x541f, &(0x7f00000000c0)={0x83f2, 0x3, 0x4, 0x0, 0x1000, 0x101, 0x10000000000, 0x6, 0xab7, 0x1, 0x81, 0x100000000, 0x7ff, 0xff, &(0x7f0000000200)=""/243, 0x80000001, 0x3, 0x80000000}) ppoll(&(0x7f00000001c0)=[{r5}, {r3}], 0x2, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000040)=0x9, 0x4) ioctl$TIOCCBRK(r3, 0x5428) 07:32:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x4c000000, 0x0, 0x0, 0x42440000, 0x0) 07:32:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3f, 0x100) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000000c0)={0x0, 0x4b, "1ec052d396b9d8ae7dabe7a34f5a290dec721e581084b87f1bdd310f9655db0f6d891710e454ff40cadb4228b2f73170ae87b1036b282f98554fc3f522c31ae8d0cd8b99f31d8fb5b376ae"}, &(0x7f0000000140)=0x53) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000180)={r2, 0x1f}, &(0x7f00000001c0)=0x8) bind$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0xb76, {0x4, 0x8, 0x8000, 0x2375, 0xac, 0x8}, 0x3, 0x1}, 0xe) prctl$PR_CAPBSET_DROP(0x18, 0x0) [ 1237.625782][ T819] hfs: can't find a HFS filesystem on dev loop1 [ 1237.646357][ T825] hfs: can't find a HFS filesystem on dev loop0 07:32:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, &(0x7f0000000280)={0x1000, "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"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000012c0)={0x0, 0x1000, "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"}, &(0x7f0000002300)=0x1008) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000002400)={r2, 0x94, &(0x7f0000002340)=[@in={0x2, 0x4e21, @remote}, @in6={0xa, 0x4e22, 0x6, @remote, 0xb7e}, @in6={0xa, 0x4e21, 0x3f, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1d}}, 0x4b}, @in={0x2, 0x4e23, @multicast1}, @in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e20, 0xffffffffffffffe4, @dev={0xfe, 0x80, [], 0x2b}, 0x7}, @in={0x2, 0x4e24, @broadcast}]}, &(0x7f0000002440)=0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002480)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_CAPBSET_DROP(0x18, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000002500)={{{@in6=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in=@local}}, &(0x7f0000002600)=0xe8) r5 = getegid() fchown(r3, r4, r5) r6 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000040)=0x10) bind$isdn_base(r1, &(0x7f00000024c0)={0x22, 0x6, 0xffffffffffffff00, 0x800, 0x2}, 0x6) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x0, 0x5, [0xffffffff, 0xff, 0x8a4, 0xfffffffffffffff8, 0xffffffffffffff00]}, &(0x7f0000000100)=0x12) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f00000001c0)={r7, 0x80, &(0x7f0000000140)=[@in6={0xa, 0x4e20, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}, @in={0x2, 0x4e20, @rand_addr=0x8001}, @in6={0xa, 0x4e24, 0x1, @mcast2, 0x8}, @in6={0xa, 0x4e20, 0x7, @remote, 0x2}, @in6={0xa, 0x4e20, 0x8, @loopback, 0x5}]}, &(0x7f0000000200)=0x10) 07:32:30 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:32:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1237.766950][ T829] hfs: gid requires an argument [ 1237.777523][ T829] hfs: unable to parse mount options 07:32:30 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x420001, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={@remote={[], 0x1}, 0xa, 'ifb0\x00'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) prctl$PR_CAPBSET_DROP(0x18, 0x0) getitimer(0xf8a209db56c66d61, &(0x7f0000000000)) 07:32:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x68000000, 0x0, 0x0, 0x42440000, 0x0) [ 1237.885214][ T950] hfs: gid requires an argument [ 1237.892412][ T950] hfs: unable to parse mount options [ 1237.892587][ T943] hfs: can't find a HFS filesystem on dev loop1 07:32:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:31 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open$cgroup(&(0x7f0000000000)={0x5, 0x70, 0x5, 0x7, 0x5, 0x5, 0x0, 0x53c7, 0x40, 0x2, 0x101, 0x0, 0x8, 0x0, 0x3, 0x2, 0x146, 0x7, 0x4, 0x1, 0x2, 0x80, 0x6, 0x3, 0x7ff, 0xdedb, 0x6, 0x1, 0x9, 0x7, 0x4a, 0x1ff, 0xffff, 0x7, 0x9, 0xf5, 0x9, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x0, 0x9553}, 0x800, 0x80000001, 0x0, 0x0, 0x2, 0xffffffff, 0xc}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000000c0)=0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x7) [ 1238.010943][ T953] hfs: can't find a HFS filesystem on dev loop0 07:32:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x6c000000, 0x0, 0x0, 0x42440000, 0x0) 07:32:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1238.111884][ T961] hfs: gid requires an argument [ 1238.124652][ T961] hfs: unable to parse mount options 07:32:31 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x2201, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="481fca6f238e0d20e96b70d8d921ff", 0xf) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$RTC_PIE_OFF(r1, 0x7006) prctl$PR_CAPBSET_DROP(0x18, 0x14) 07:32:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1238.173554][ T967] hfs: can't find a HFS filesystem on dev loop1 [ 1238.187222][ T974] hfs: gid requires an argument [ 1238.202072][ T974] hfs: unable to parse mount options 07:32:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) [ 1238.312443][ T982] Unknown ioctl 28678 [ 1238.319184][ T983] Unknown ioctl 28678 [ 1238.403719][ T979] hfs: can't find a HFS filesystem on dev loop0 [ 1238.473924][ T991] hfs: gid requires an argument [ 1238.478816][ T991] hfs: unable to parse mount options [ 1238.486237][ T989] hfs: can't find a HFS filesystem on dev loop1 [ 1238.606619][ T996] hfs: gid requires an argument [ 1238.619452][ T996] hfs: unable to parse mount options 07:32:31 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6}) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) sendto$llc(r3, &(0x7f0000000200)="92b4697b71ff1fdfd831b4e2802b1190205484c6509493aec524dfc6ee196b37f2fdd2256257e5f731dcad9b414ccca637f439ad30dd26363643c946b87317d41f825016bfce61367889b1849cbd2ecf76d5789bb0980ef9268b58da7f03dcacecfec8b65c6b0ff303ae031909bab07733dd1f97f72d1c8886f7da62a1c91cf20d52bcccae89adbd9097d421c69a034ac7108b4c8eb0373052cd5911fc637535275aab942c91b5ed93a673bf097c8eb5fbe90374cdec53b8cdae85469072adca38dc02fedcc42581edbefb0030bea01be8dbd9e06821d55fa92eab607c86f4d1dad70bd22348", 0xe6, 0x8000, &(0x7f0000000000)={0x1a, 0x204, 0x6, 0x3, 0x0, 0x6, @broadcast}, 0x10) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:32:31 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) pipe2(&(0x7f0000000000), 0x4800) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x200102, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x80040) pipe(&(0x7f0000000140)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x74000000, 0x0, 0x0, 0x42440000, 0x0) 07:32:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) [ 1238.804090][ T1113] hfs: can't find a HFS filesystem on dev loop1 [ 1238.810704][ T1112] hfs: can't find a HFS filesystem on dev loop0 07:32:31 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8, 0x400000) write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000040)={0x1, 0x7}, 0x2) r3 = syz_open_pts(r1, 0x40080) dup3(r3, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r3}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:32:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x7a000000, 0x0, 0x0, 0x42440000, 0x0) 07:32:31 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) syz_read_part_table(0xffffffff, 0x2, &(0x7f0000000180)=[{&(0x7f0000000000)="97448943c53e9ec9d466efe20cf9bac5920a1e4a2970ecf9f39fc9516e927eac943df1ab447c2c3b34053c991f0c8b6d6afa0d5b839f0ad28f2a8d6d0809776d455866da3d2aebbc8ea2938c32f95ce8b54f849292f9067d02cebf914c9fcd4bcdce10b0f86a52d5b3b3943bf7949cbdc757f64064", 0x75, 0x1}, {&(0x7f00000000c0)="d563de5ad03034e877f90a77265c4c7e5e424d55e54c498d0180e8e67e30cee1213ee90294bf431cba70e98a725293dfe88d0153e6935621622fdad2528ec1e73bf80c4b8af79f59b1ea3333231f1458fca21404b33f9834460e175f1cd291730f0d4d11142f7ee5de3e70e7cd155dcc9cada1929719a59c13185ce45c6f8e79cff9587552ad47c47a98520df7db041301afc8de0ba0fbcea4843163607d714518e3878f9b3671037bda5d31439d6b524cf9a0caf96891b2a6beb1", 0xbb, 0x1}]) r1 = socket(0xf, 0x5, 0x9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000001c0)={0x0, 0x46, "f6520d72ffb2395fbddbaf3c60f2b96e969636ef23dd980763c2de21dc200a0383b1d20b84d1cd7dc606235460504f7d623a93f9fa130abe12e00deeb82f2f21e0983f3088c2"}, &(0x7f0000000240)=0x4e) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000280)={0x20, 0x8002, 0x8, 0x7fffffff, r2}, 0x10) 07:32:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1238.963344][ T1187] hfs: gid requires an argument 07:32:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1239.012335][ T1187] hfs: unable to parse mount options 07:32:32 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200, 0xc) ioctl$TCSETS(r1, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1}) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f0000000200)={0x0, 0x7, 0x4, {0x5809fc036fa27a0f, @raw_data="4595444748fe10f1e0695166aca80036ca33d33c94eb62fb2428b1abc6d07bc30cece0adacecea9cd2b568099375bcdd785d904003f0aee31ccebcab1406fc97e3e68d57e796f3199218584f13e8ec8412992460503f8e0a18d815c6ca061f9b1c4201b72eb9a8dc3a42a4a001e252db6f6cd804b56b861b924211af7fc0962b59210d89da9bf61230c10df2092da84a240d99ae9114018ef2771bccfac61336a2d4ffacdde6b48f87daba3c990a55d7b6eff579ed9cb386a69a3627f5ad436cc55ccb6cb1f5428f"}}) r3 = syz_open_pts(r1, 0x0) dup3(r3, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r3}, {r1}], 0x2, 0x0, 0x0, 0x0) [ 1239.205744][ T1239] hfs: gid requires an argument [ 1239.221080][ T1237] hfs: can't find a HFS filesystem on dev loop0 [ 1239.229975][ T1239] hfs: unable to parse mount options 07:32:32 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) poll(&(0x7f0000000000)=[{r1, 0x80}, {r1, 0x200}, {r2, 0xc313992d011803c5}, {r1, 0x200}, {r2, 0x20}, {r0, 0x2000}, {r2, 0x2000}], 0x7, 0x5) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)) r3 = syz_open_pts(r2, 0x0) dup3(r3, r2, 0x0) ppoll(&(0x7f00000001c0)=[{r3}, {r2}], 0x2, 0x0, 0x0, 0x0) [ 1239.257442][ T1242] hfs: can't find a HFS filesystem on dev loop1 07:32:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x8cffffff, 0x0, 0x0, 0x42440000, 0x0) 07:32:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:32 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x7ff, 0x4, 0xfe, 0xc70, 0x2, 0x3, 0x1, 0xef, 0x40, 0x1b3, 0x4, 0x6b6c, 0x38, 0x2, 0x8, 0x5, 0x3}, [{0x4, 0x6, 0x8, 0x4, 0x0, 0x2, 0xb1e9, 0x7f}], "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", [[], [], [], [], [], [], []]}, 0x1778) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:32 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x40, &(0x7f0000000000)=0x20d, 0x4) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) 07:32:32 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x4, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x32, 0x1d, 0xd, 0x10, 0x2, 0xe987, 0x5, 0x32}}) prctl$PR_CAPBSET_DROP(0x18, 0x0) [ 1239.554408][ T1362] hfs: gid requires an argument [ 1239.559288][ T1362] hfs: unable to parse mount options 07:32:32 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt(r0, 0x1000, 0x9, &(0x7f0000000200)=""/158, &(0x7f0000000040)=0x9e) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x402) r3 = dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f0000000000)={0x4, 0x8, 0x3}) 07:32:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0xf6ffffff, 0x0, 0x0, 0x42440000, 0x0) 07:32:32 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8286, 0x8000) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000040)) [ 1239.687528][ T1485] hfs: gid requires an argument [ 1239.693005][ T1373] hfs: can't find a HFS filesystem on dev loop0 [ 1239.699179][ T1485] hfs: unable to parse mount options [ 1239.699662][ T1374] hfs: can't find a HFS filesystem on dev loop1 07:32:32 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x3) r3 = dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r3}], 0x2, 0x0, 0x0, 0x3c6) 07:32:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:32 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x8000, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1239.947547][ T1635] hfs: can't find a HFS filesystem on dev loop0 [ 1239.960353][ T1621] hfs: gid requires an argument 07:32:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x4000000, 0x0, 0x0, 0x42440000, 0x0) 07:32:33 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x3f562eb1d6541d8a, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x4) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000040)={0x2a66, 0x4, 0x63, &(0x7f00000000c0)="e8cd922eef0377eb4e0bdd38dd56b389b37d09ce4b4b2ee7369165299bddae2380b41f5630c5c3e648f4eddc5807dd01530a9a377015d7f8a20ce035862479abca235d1e2a41d46940ae7bb580693397f95fb16ea85c8161cabbf7da42bcacc8ec2ce8"}) prctl$PR_CAPBSET_DROP(0x18, 0xb) [ 1239.990763][ T1621] hfs: unable to parse mount options 07:32:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0xfcfdffff, 0x0, 0x0, 0x42440000, 0x0) 07:32:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:33 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x20000000021) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x8000, @dev={0xfe, 0x80, [], 0x28}, 0xd}, 0x1c) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x101400, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f00000000c0)={0x2, 0xfffffffffffffffd}, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r4 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r3, &(0x7f0000000180)='rxrpc_s\x00', &(0x7f00000001c0)={'syz', 0x2}, r4) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x11c00200}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x24, r4, 0x1, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) setsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f0000000000)=0x740, 0x2) r5 = getpgrp(0x0) migrate_pages(r5, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) [ 1240.172239][ T1720] hfs: can't find a HFS filesystem on dev loop1 [ 1240.197279][ T1730] hfs: gid requires an argument [ 1240.209863][ T1730] hfs: unable to parse mount options 07:32:33 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x0, 0x2) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000140)={'security\x00'}, &(0x7f00000001c0)=0x54) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1240.345158][ T1735] hfs: can't find a HFS filesystem on dev loop0 07:32:33 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x11c00200}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x24, r4, 0x1, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) setsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f0000000000)=0x740, 0x2) r5 = getpgrp(0x0) migrate_pages(r5, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) 07:32:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0xfdfdffff, 0x0, 0x0, 0x42440000, 0x0) 07:32:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:33 executing program 3: personality(0xd00000f) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) move_pages(r1, 0x6, &(0x7f00000000c0)=[&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000100)=[0x0, 0x9, 0xee], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:33 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e21, 0x1, @empty, 0x3}}}, &(0x7f0000000280)=0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000002c0)={r2, 0x3}, 0x8) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) r4 = msgget(0x3, 0x275b8f54cbd3d471) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000340)=""/10) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, &(0x7f00000000c0)={r5, r6+10000000}, &(0x7f0000000100)=0x2, 0x1) ioctl$KVM_SMI(r3, 0xaeb7) 07:32:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x11c00200}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x24, r4, 0x1, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) setsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f0000000000)=0x740, 0x2) r5 = getpgrp(0x0) migrate_pages(r5, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) [ 1240.556469][ T1748] hfs: can't find a HFS filesystem on dev loop1 [ 1240.573303][ T1753] hfs: gid requires an argument [ 1240.578180][ T1753] hfs: unable to parse mount options 07:32:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1240.732563][ T1770] hfs: can't find a HFS filesystem on dev loop0 [ 1240.744249][ T1785] hfs: gid requires an argument [ 1240.749108][ T1785] hfs: unable to parse mount options 07:32:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x11c00200}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x24, r4, 0x1, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) setsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f0000000000)=0x740, 0x2) migrate_pages(0x0, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) 07:32:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0xff000000, 0x0, 0x0, 0x42440000, 0x0) 07:32:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:34 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x11c00200}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x24, r4, 0x1, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) setsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f0000000000)=0x740, 0x2) migrate_pages(0x0, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) [ 1240.952336][ T1793] hfs: can't find a HFS filesystem on dev loop1 07:32:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0xfffffdfc, 0x0, 0x0, 0x42440000, 0x0) 07:32:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:34 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x11c00200}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x24, r4, 0x1, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) setsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f0000000000)=0x740, 0x2) migrate_pages(0x0, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) [ 1241.125239][ T1805] hfs: can't find a HFS filesystem on dev loop0 07:32:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1241.203773][ T1813] hfs: gid requires an argument [ 1241.208641][ T1813] hfs: unable to parse mount options [ 1241.385477][ T1821] hfs: can't find a HFS filesystem on dev loop1 [ 1241.486821][ T1826] hfs: can't find a HFS filesystem on dev loop0 07:32:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:34 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x11c00200}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x24, r4, 0x1, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) r5 = getpgrp(0x0) migrate_pages(r5, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) 07:32:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0xfffffdfd, 0x0, 0x0, 0x42440000, 0x0) 07:32:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:34 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') r3 = getpgrp(0x0) migrate_pages(r3, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) 07:32:34 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@remote, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000002c0)=0xe8) recvmmsg(r0, &(0x7f0000006780)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)=""/76, 0x4c}, {&(0x7f0000000440)=""/169, 0xa9}, {&(0x7f0000000500)=""/51, 0x33}, {&(0x7f0000000540)=""/195, 0xc3}], 0x4, &(0x7f0000000680)=""/147, 0x93}, 0x9}, {{&(0x7f0000000740)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000001b40)=[{&(0x7f00000007c0)=""/178, 0xb2}, {&(0x7f0000000880)=""/113, 0x71}, {&(0x7f0000000900)=""/89, 0x59}, {&(0x7f0000000980)=""/76, 0x4c}, {&(0x7f0000000a00)=""/4096, 0x1000}, {&(0x7f0000001a00)=""/101, 0x65}, {&(0x7f0000001a80)=""/33, 0x21}, {&(0x7f0000001ac0)=""/106, 0x6a}], 0x8}, 0x2}, {{&(0x7f0000001bc0)=@nl=@proc, 0x80, &(0x7f00000040c0)=[{&(0x7f0000001c40)=""/179, 0xb3}, {&(0x7f0000001d00)=""/4096, 0x1000}, {&(0x7f0000002d00)=""/221, 0xdd}, {&(0x7f0000002e00)}, {&(0x7f0000002e40)=""/218, 0xda}, {&(0x7f0000002f40)=""/4096, 0x1000}, {&(0x7f0000003f40)=""/151, 0x97}, {&(0x7f0000004000)=""/175, 0xaf}], 0x8}, 0x5}, {{0x0, 0x0, &(0x7f00000042c0)=[{&(0x7f0000004140)=""/225, 0xe1}, {&(0x7f0000004240)=""/87, 0x57}], 0x2, &(0x7f0000004300)=""/170, 0xaa}, 0x6}, {{&(0x7f00000043c0)=@sco, 0x80, &(0x7f0000006640)=[{&(0x7f0000004440)=""/52, 0x34}, {&(0x7f0000004480)=""/4096, 0x1000}, {&(0x7f0000005480)=""/151, 0x97}, {&(0x7f0000005540)=""/241, 0xf1}, {&(0x7f0000005640)=""/4096, 0x1000}], 0x5, &(0x7f00000066c0)=""/131, 0x83}, 0x2}], 0x5, 0x40002000, &(0x7f00000068c0)) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x1, &(0x7f0000000180)=[{&(0x7f00000000c0)="c552cafa5dd322b3007e6d25c66d69acbf48178785b45a3e809c9b7251195e0f8995b8440d1379052bc1dca82e108904f4850f6cf861ef419ebf977b4978ebc25209f1e31198192e39d7caf8977c563b00b01f2eff8c2292de95d7beb046855894cf5623f22ce68886062b8f83d451d6fd7606651ba8e46188cc61a4b12697e26563866f9a66af20a61e0dacbf9827af65ecdc4b5462d39cdae2a9c0d0d225424e7f2f8e87653c9937651d2afea4534ec47aa3329b50b1987f29358ecc0e", 0xbe, 0x10001}], 0x1800, &(0x7f0000000300)={[{@cruft='cruft'}, {@sbsector={'sbsector', 0x3d, 0x8000}}, {@uid={'uid', 0x3d, r1}}, {@nojoliet='nojoliet'}, {@norock='norock'}, {@dmode={'dmode', 0x3d, 0xe3}}], [{@measure='measure'}, {@smackfsroot={'smackfsroot', 0x3d, 'lo@/em1em0bdevlo)em1\x00'}}, {@pcr={'pcr'}}]}) prctl$PR_CAPBSET_DROP(0x18, 0x0) [ 1241.609048][ T1836] hfs: can't find a HFS filesystem on dev loop1 [ 1241.629324][ T1838] hfs: gid requires an argument [ 1241.640125][ T1838] hfs: unable to parse mount options 07:32:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:34 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ppoll(&(0x7f00000001c0)=[{r2}, {r1}], 0x2, 0x0, 0x0, 0x0) r3 = getpgrp(0x0) migrate_pages(r3, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) 07:32:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0xffffff8c, 0x0, 0x0, 0x42440000, 0x0) [ 1241.817959][ T1854] hfs: gid requires an argument [ 1241.823112][ T1847] hfs: can't find a HFS filesystem on dev loop0 [ 1241.836175][ T1854] hfs: unable to parse mount options 07:32:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:35 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) r3 = getpgrp(0x0) migrate_pages(r3, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) [ 1242.013812][ T1860] hfs: can't find a HFS filesystem on dev loop1 [ 1242.130348][ T1871] hfs: can't find a HFS filesystem on dev loop0 07:32:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:35 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) syz_open_pts(r1, 0x0) r2 = getpgrp(0x0) migrate_pages(r2, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) [ 1242.172246][ T1875] hfs: gid requires an argument [ 1242.189851][ T1875] hfs: unable to parse mount options 07:32:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0xfffffff6, 0x0, 0x0, 0x42440000, 0x0) [ 1242.353819][ T1882] hfs: gid requires an argument [ 1242.358694][ T1882] hfs: unable to parse mount options 07:32:35 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000140)) r2 = getpgrp(0x0) migrate_pages(r2, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) [ 1242.436477][ T1885] hfs: can't find a HFS filesystem on dev loop1 [ 1242.557072][ T1892] hfs: can't find a HFS filesystem on dev loop0 07:32:35 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x1) 07:32:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:35 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r1 = getpgrp(0x0) migrate_pages(r1, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) 07:32:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x1000000000, 0x0, 0x0, 0x42440000, 0x0) 07:32:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:35 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpgrp(0x0) migrate_pages(r1, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) [ 1242.764885][ T1910] hfs: gid requires an argument [ 1242.769759][ T1910] hfs: unable to parse mount options [ 1242.779493][ T1905] hfs: can't find a HFS filesystem on dev loop1 07:32:35 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xfa2c4d4892d5bb5b}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="00050ebd7000fedbc758020000000800060006000000"], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x8000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000240)={0x4, &(0x7f0000000200)=[{}, {}, {0x0}, {0x0}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000000280)={r3, 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f0000000340)={r4, 0x1}) bind$netrom(r0, &(0x7f00000002c0)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x5}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 07:32:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = getpgrp(0x0) migrate_pages(r0, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) [ 1242.973791][ T1914] hfs: can't find a HFS filesystem on dev loop0 07:32:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x404200000000, 0x0, 0x0, 0x42440000, 0x0) 07:32:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:36 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f0000000140)=""/97) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000480)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}) ioctl$KVM_IRQ_LINE_STATUS(r3, 0xc008ae67, &(0x7f0000000080)={0x0, 0x1000}) prctl$PR_CAPBSET_DROP(0x18, 0x0) 07:32:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = getpgrp(0x0) migrate_pages(r0, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) [ 1243.131865][ T1930] hfs: can't find a HFS filesystem on dev loop1 07:32:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1243.202524][ T1935] hfs: gid requires an argument [ 1243.218000][ T1935] hfs: unable to parse mount options 07:32:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = getpgrp(0x0) migrate_pages(r0, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) [ 1243.318797][ T1942] hfs: can't find a HFS filesystem on dev loop0 07:32:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x40000000000000, 0x0, 0x0, 0x42440000, 0x0) 07:32:36 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e21, 0x1, @empty, 0x3}}}, &(0x7f0000000280)=0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000002c0)={r2, 0x3}, 0x8) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) r4 = msgget(0x3, 0x275b8f54cbd3d471) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000340)=""/10) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, &(0x7f00000000c0)={r5, r6+10000000}, &(0x7f0000000100)=0x2, 0x1) ioctl$KVM_SMI(r3, 0xaeb7) 07:32:36 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = getpgrp(0x0) migrate_pages(r0, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) [ 1243.451360][ T1953] hfs: can't find a HFS filesystem on dev loop1 07:32:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:36 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = getpgrp(0x0) migrate_pages(r0, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) [ 1243.506330][ T1964] hfs: gid requires an argument [ 1243.511293][ T1964] hfs: unable to parse mount options 07:32:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x100000000000000, 0x0, 0x0, 0x42440000, 0x0) 07:32:36 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = getpgrp(0x0) migrate_pages(r0, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) [ 1243.681750][ T1975] hfs: can't find a HFS filesystem on dev loop0 [ 1243.692251][ T1987] hfs: gid requires an argument [ 1243.697477][ T1980] hfs: can't find a HFS filesystem on dev loop1 [ 1243.706046][ T1987] hfs: unable to parse mount options 07:32:36 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpgrp(0x0) migrate_pages(r1, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) 07:32:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:36 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpgrp(0x0) migrate_pages(r1, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) 07:32:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1243.990565][ T1997] hfs: can't find a HFS filesystem on dev loop0 [ 1244.093157][ T2005] hfs: gid requires an argument [ 1244.108647][ T2005] hfs: unable to parse mount options [ 1244.127991][ T2008] hfs: can't find a HFS filesystem on dev loop1 07:32:37 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e21, 0x1, @empty, 0x3}}}, &(0x7f0000000280)=0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000002c0)={r2, 0x3}, 0x8) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) r4 = msgget(0x3, 0x275b8f54cbd3d471) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000340)=""/10) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, &(0x7f00000000c0)={r5, r6+10000000}, &(0x7f0000000100)=0x2, 0x1) ioctl$KVM_SMI(r3, 0xaeb7) 07:32:37 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpgrp(0x0) migrate_pages(r1, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) 07:32:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x200000000000000, 0x0, 0x0, 0x42440000, 0x0) 07:32:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:37 executing program 4: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = getpgrp(0x0) migrate_pages(r0, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) 07:32:37 executing program 4: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = getpgrp(0x0) migrate_pages(r0, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) [ 1244.407559][ T2023] hfs: gid requires an argument [ 1244.415695][ T2019] hfs: can't find a HFS filesystem on dev loop0 [ 1244.426371][ T2023] hfs: unable to parse mount options 07:32:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x300000000000000, 0x0, 0x0, 0x42440000, 0x0) [ 1244.524181][ T2021] hfs: can't find a HFS filesystem on dev loop1 07:32:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:37 executing program 4: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = getpgrp(0x0) migrate_pages(r0, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) 07:32:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1244.787152][ T2047] hfs: can't find a HFS filesystem on dev loop0 [ 1244.847572][ T2051] hfs: can't find a HFS filesystem on dev loop1 07:32:38 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e21, 0x1, @empty, 0x3}}}, &(0x7f0000000280)=0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000002c0)={r2, 0x3}, 0x8) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) r4 = msgget(0x3, 0x275b8f54cbd3d471) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000340)=""/10) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, &(0x7f00000000c0)={r5, r6+10000000}, &(0x7f0000000100)=0x2, 0x1) ioctl$KVM_SMI(r3, 0xaeb7) 07:32:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = getpgrp(0x0) migrate_pages(r0, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) 07:32:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x400000000000000, 0x0, 0x0, 0x42440000, 0x0) 07:32:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = getpgrp(0x0) migrate_pages(r0, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) [ 1245.278611][ T2061] hfs: can't find a HFS filesystem on dev loop1 [ 1245.333202][ T2065] hfs: gid requires an argument [ 1245.333469][ T2059] hfs: can't find a HFS filesystem on dev loop0 [ 1245.338077][ T2065] hfs: unable to parse mount options 07:32:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = getpgrp(0x0) migrate_pages(r0, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) 07:32:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x500000000000000, 0x0, 0x0, 0x42440000, 0x0) 07:32:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = getpgrp(0x0) migrate_pages(r1, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) [ 1245.481152][ T2077] hfs: gid requires an argument [ 1245.489340][ T2077] hfs: unable to parse mount options [ 1245.652174][ T2085] hfs: can't find a HFS filesystem on dev loop1 [ 1245.793542][ T2088] hfs: can't find a HFS filesystem on dev loop0 07:32:39 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e21, 0x1, @empty, 0x3}}}, &(0x7f0000000280)=0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000002c0)={r2, 0x3}, 0x8) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x0) r3 = msgget(0x3, 0x275b8f54cbd3d471) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000340)=""/10) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) futex(&(0x7f0000000000)=0x2, 0x0, 0x2, &(0x7f00000000c0)={r4, r5+10000000}, &(0x7f0000000100)=0x2, 0x1) 07:32:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@gid={'gid', 0x3d, r1}}]}) 07:32:39 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = getpgrp(0x0) migrate_pages(r1, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) 07:32:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x600000000000000, 0x0, 0x0, 0x42440000, 0x0) 07:32:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:39 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = getpgrp(0x0) migrate_pages(r1, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) [ 1246.178356][ T2099] hfs: can't find a HFS filesystem on dev loop1 [ 1246.213762][ T2105] hfs: gid requires an argument [ 1246.218639][ T2105] hfs: unable to parse mount options [ 1246.224604][ T2101] hfs: can't find a HFS filesystem on dev loop0 07:32:39 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getpgrp(0x0) migrate_pages(0x0, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) 07:32:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") syz_mount_image$hfs(0x0, &(0x7f0000000100)='./bus\x00', 0x700000000000000, 0x0, 0x0, 0x42440000, 0x0) 07:32:39 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getpgrp(0x0) migrate_pages(0x0, 0x5, &(0x7f0000000280)=0x70000000000, &(0x7f00000002c0)=0x5) 07:32:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\xff', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") 07:32:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5005e0bcfe57bf070") [ 1246.454804][ T2121] hfs: gid requires an argument [ 1246.459684][ T2121] hfs: unable to parse mount options [ 1246.656183][T10265] WARNING: CPU: 0 PID: 10265 at fs/block_dev.c:1899 __blkdev_put+0x6ba/0x810 [ 1246.657282][ T3881] kobject: 'loop1' (0000000096163840): kobject_uevent_env [ 1246.664963][T10265] Kernel panic - not syncing: panic_on_warn set ... [ 1246.664979][T10265] CPU: 0 PID: 10265 Comm: syz-executor.1 Not tainted 5.3.0-rc3-next-20190809 #63 [ 1246.664986][T10265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1246.664990][T10265] Call Trace: [ 1246.665009][T10265] dump_stack+0x172/0x1f0 [ 1246.665029][T10265] ? __blkdev_put+0x5d0/0x810 [ 1246.673703][ T3881] kobject: 'loop1' (0000000096163840): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1246.680232][T10265] panic+0x2dc/0x755 [ 1246.725709][T10265] ? add_taint.cold+0x16/0x16 [ 1246.730401][T10265] ? __kasan_check_write+0x14/0x20 [ 1246.735518][T10265] ? __warn.cold+0x5/0x4c [ 1246.739866][T10265] ? __warn+0xe7/0x1e0 [ 1246.744024][T10265] ? __blkdev_put+0x6ba/0x810 [ 1246.748731][T10265] __warn.cold+0x20/0x4c [ 1246.752998][T10265] ? __blkdev_put+0x6ba/0x810 [ 1246.757686][T10265] report_bug+0x263/0x2b0 [ 1246.762046][T10265] do_error_trap+0x11b/0x200 [ 1246.766645][T10265] do_invalid_op+0x37/0x50 [ 1246.771060][T10265] ? __blkdev_put+0x6ba/0x810 [ 1246.775753][T10265] invalid_op+0x23/0x30 [ 1246.779920][T10265] RIP: 0010:__blkdev_put+0x6ba/0x810 [ 1246.785205][T10265] Code: 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 84 24 fd ff ff 48 8b bd 50 ff ff ff e8 90 5d e6 ff e9 13 fd ff ff e8 46 6f ab ff <0f> 0b e9 dc fa ff ff 48 89 cf e8 57 5d e6 ff e9 6a fa ff ff 48 8b [ 1246.804815][T10265] RSP: 0018:ffff888088497c90 EFLAGS: 00010293 [ 1246.810890][T10265] RAX: ffff88808d1ce000 RBX: ffff8880a6a8a080 RCX: ffffffff81c6a4c4 [ 1246.818866][T10265] RDX: 0000000000000000 RSI: ffffffff81c6a9ea RDI: 0000000000000005 [ 1246.826843][T10265] RBP: ffff888088497d88 R08: ffff88808d1ce000 R09: ffffed1014d51414 [ 1246.834817][T10265] R10: ffff888088497c80 R11: ffff8880a6a8a09f R12: 0000000000000002 [ 1246.842832][T10265] R13: dffffc0000000000 R14: ffff8880a6a8a098 R15: ffff8880a6a8a098 [ 1246.850831][T10265] ? __blkdev_put+0x194/0x810 [ 1246.855519][T10265] ? __blkdev_put+0x6ba/0x810 [ 1246.860209][T10265] ? bd_set_size+0xb0/0xb0 [ 1246.864632][T10265] ? wait_for_completion+0x440/0x440 [ 1246.869925][T10265] blkdev_put+0x98/0x560 [ 1246.874174][T10265] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1246.880419][T10265] blkdev_close+0x8b/0xb0 [ 1246.884753][T10265] __fput+0x2ff/0x890 [ 1246.888752][T10265] ? blkdev_put+0x560/0x560 [ 1246.893278][T10265] ____fput+0x16/0x20 [ 1246.897283][T10265] task_work_run+0x145/0x1c0 [ 1246.901888][T10265] exit_to_usermode_loop+0x316/0x380 [ 1246.907178][T10265] do_syscall_64+0x65f/0x760 [ 1246.911783][T10265] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1246.917675][T10265] RIP: 0033:0x4134f0 [ 1246.921573][T10265] Code: 01 f0 ff ff 0f 83 30 1b 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 3d 9d 2d 66 00 00 75 14 b8 03 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff [ 1246.941180][T10265] RSP: 002b:00007ffe51800cb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 1246.949858][T10265] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 00000000004134f0 [ 1246.957855][T10265] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000003 [ 1246.965853][T10265] RBP: 0000000000001c58 R08: 0000000000000000 R09: 000000000000000a [ 1246.974005][T10265] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 [ 1246.982016][T10265] R13: 00007ffe51800cf0 R14: 00000000001303a0 R15: 00007ffe51800d00 [ 1246.991224][T10265] Kernel Offset: disabled [ 1246.995545][T10265] Rebooting in 86400 seconds..