, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepaMe', 0x3d, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:22 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001}) 21:31:22 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x60000000}) 21:31:22 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepaDe', 0x3d, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:23 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) lseek(r1, 0x0, 0x0) read(r1, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r2, 0x80080) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) 21:31:23 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0xa00}) [ 716.880896] hfs: unable to parse mount options [ 716.886302] usb usb9: usbfs: process 14755 (syz-executor4) did not claim interface 0 before use [ 716.905016] usb usb9: check_ctrlrecip: process 14756 (syz-executor7) requesting ep 01 but needs 81 [ 716.914344] usb usb9: usbfs: process 14756 (syz-executor7) did not claim interface 0 before use 21:31:23 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) [ 716.965960] hfs: unable to parse mount options 21:31:23 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}, 0x5c) 21:31:23 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepag\n', 0x3d, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 717.025757] hfs: unable to parse mount options [ 717.045682] usb usb9: usbfs: process 14774 (syz-executor1) did not claim interface 0 before use 21:31:23 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x5460, &(0x7f0000000240)={0x302, 0x1000001}) 21:31:23 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x7a00}) 21:31:23 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepaie', 0x3d, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 717.190523] hfs: unable to parse mount options 21:31:23 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x2, &(0x7f0000000240)) 21:31:23 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x7}) [ 717.260078] usb usb9: usbfs: process 14799 (syz-executor4) did not claim interface 0 before use [ 717.272651] hfs: unable to parse mount options [ 717.280695] hfs: unable to parse mount options 21:31:23 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, &(0x7f0000000240)={0x302, 0x1000001}) [ 717.347729] hfs: unable to parse mount options 21:31:23 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffa4]}, 0x5c) 21:31:23 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x2000}) 21:31:23 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepag%', 0x3d, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:23 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0045878, &(0x7f0000000240)) [ 717.429195] usb usb9: usbfs: process 14814 (syz-executor1) did not claim interface 0 before use 21:31:23 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepaRe', 0x3d, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 717.528148] usb usb9: usbfs: process 14828 (syz-executor4) did not claim interface 0 before use [ 717.551760] hfs: unable to parse mount options [ 717.607852] hfs: unable to parse mount options 21:31:23 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = dup(r0) write$FUSE_INTERRUPT(r0, &(0x7f00000000c0)={0x10, 0x0, 0x4}, 0x10) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r2, 0x80080) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 21:31:23 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc020660b, &(0x7f0000000240)={0x302, 0x1000001}) 21:31:23 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x4800000000000000}) 21:31:23 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4020940d, &(0x7f0000000240)) 21:31:23 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x6000}) [ 717.669771] hfs: unable to parse mount options 21:31:23 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000]}, 0x5c) [ 717.736640] usb usb9: usbfs: process 14848 (syz-executor1) did not claim interface 0 before use 21:31:23 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3a, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:23 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0045878, &(0x7f0000000240)) 21:31:24 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x700000000000000}) 21:31:24 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x4008550d, &(0x7f0000000240)={0x302, 0x1000001}) [ 717.840316] usb usb9: usbfs: process 14859 (syz-executor4) did not claim interface 0 before use 21:31:24 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepag\n', 0x3d, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:24 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x74}) 21:31:24 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x5451, &(0x7f0000000240)) [ 717.984998] usb usb9: usbfs: process 14874 (syz-executor1) did not claim interface 0 before use [ 717.995913] hfs: unable to parse mount options 21:31:24 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff00000000]}, 0x5c) 21:31:24 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0045878, &(0x7f0000000240)={0x302, 0x1000001}) [ 718.073952] hfs: unable to parse mount options [ 718.083759] hfs: unable to parse mount options 21:31:24 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x2000000}) [ 718.131003] hfs: unable to parse mount options [ 718.186515] usb usb9: usbfs: process 14898 (syz-executor4) did not claim interface 0 before use [ 718.237080] usb usb9: usbfs: process 14905 (syz-executor1) did not claim interface 0 before use 21:31:24 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000100)) read(r1, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r2, 0x4faf) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) ftruncate(r0, 0x0) ioctl$RTC_VL_CLR(r2, 0x7014) 21:31:24 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x2d, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:24 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepag%', 0x3d, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:24 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550c, &(0x7f0000000240)) 21:31:24 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x4800000000000000}) 21:31:24 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185503, &(0x7f0000000240)={0x302, 0x1000001}) [ 718.394492] hfs: unable to parse mount options 21:31:24 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x600}) 21:31:24 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x5c) [ 718.422183] hfs: unable to parse mount options [ 718.484601] usb usb9: usbfs: process 14936 (syz-executor4) did not claim interface 0 before use [ 718.485741] hfs: unable to parse mount options [ 718.523691] usb usb9: usbfs: process 14941 (syz-executor1) did not claim interface 0 before use [ 718.535391] hfs: unable to parse mount options 21:31:24 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x5, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:24 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x6800000000000000}) [ 718.560177] usb usb9: usbfs: process 14941 (syz-executor1) did not claim interface 0 before use 21:31:24 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185548, &(0x7f0000000240)={0x302, 0x1000001}) 21:31:24 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x300}) 21:31:24 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r2, 0x80080) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 21:31:24 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x13, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:24 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x3) [ 718.728440] hfs: unable to parse mount options [ 718.744146] usb usb9: usbfs: process 14963 (syz-executor4) did not claim interface 0 before use 21:31:24 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x551f, &(0x7f0000000240)={0x302, 0x1000001}) [ 718.805306] hfs: unable to parse mount options [ 718.817593] usb usb9: usbfs: process 14976 (syz-executor1) did not claim interface 0 before use [ 718.829817] hfs: unable to parse mount options 21:31:25 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x6c00000000000000}) 21:31:25 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x1c, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 718.913601] hfs: unable to parse mount options 21:31:25 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x3f00000000000000}) [ 719.013874] usb usb9: usbfs: process 14993 (syz-executor4) did not claim interface 0 before use [ 719.032862] hfs: unable to parse mount options [ 719.042582] usb usb9: usbfs: process 14998 (syz-executor1) did not claim interface 0 before use [ 719.069321] hfs: unable to parse mount options 21:31:25 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4008550d, &(0x7f0000000240)) 21:31:25 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0xe, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:25 executing program 5: syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x80c1) r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000280)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000800)=""/193, &(0x7f00000000c0)=0xc1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x200, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r7, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) ioctl$PIO_FONTRESET(r6, 0x4b6d, 0x0) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) fallocate(r4, 0x59, 0xff20, 0x5) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:25 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0186300, &(0x7f0000000240)={0x302, 0x1000001}) 21:31:25 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3c, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:25 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x6000000}) 21:31:25 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x6800}) 21:31:25 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) r3 = getpgrp(0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000100)=0x0) kcmp(r3, r4, 0x4, r1, r1) read(r1, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r2, 0x80080) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) [ 719.309888] usb usb9: usbfs: process 15021 (syz-executor4) did not claim interface 0 before use [ 719.311125] hfs: unable to parse mount options [ 719.327739] usb usb9: usbfs: process 15024 (syz-executor1) did not claim interface 0 before use [ 719.341884] hfs: unable to parse mount options [ 719.369836] hfs: unable to parse mount options [ 719.374929] hfs: unable to parse mount options 21:31:25 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc018550a, &(0x7f0000000240)={0x302, 0x1000001}) 21:31:25 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x3f00}) 21:31:25 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x5421, &(0x7f0000000240)) 21:31:25 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x26, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:25 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x10, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:25 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0xffffff7f00000000}) 21:31:25 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = syz_open_dev$mice(&(0x7f00000005c0)='/dev/input/mice\x00', 0x0, 0x2000) bind$vsock_stream(r2, &(0x7f0000000640)={0x28, 0x0, 0xffffffff}, 0x10) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r4) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000680)='btrfs\x00', &(0x7f0000000700)='./file0\x00', 0x7f, 0x6, &(0x7f0000002980)=[{&(0x7f0000000740)="22f010a1ea3ddc981986804feea567e5738aa2c38fa2cdb835c6cb80fec87f6e43f80e836937e9e2b1d33bfae8a14399de4d50205c71e8", 0x37, 0x7}, {&(0x7f0000000800)="b6a3210cf27ea92778e88516f2c5f56f603cc39398bd5195ff516bd99e00fe03a608ed0305b2c20ed927770307433aedcc276e8f66cead8795c8707ff227d54eaa606b3c431143e03a14c6c4d34fafa4a93c5533d9d8c0ec6908d1f8d6ded2c09ea811ae3668126bb895f39afb23a4c2aeefe9c9f6419ddcf1fa7d8a6feb5ed28d3bd764cb805c", 0x87, 0x7}, {&(0x7f0000000780)="f8d939c64074690ade", 0x9, 0x73}, {&(0x7f00000008c0)="1adad394d4e56f3c4ae1281155c81ecc24456d504b2d7364135d91b53f723b28949e89000619983378f0021cd99418d4092f379bcb3f22df0ca894f0600a5ef8515d64c6b583b1ade4663575a2dd4f9957d5f100f30335e240e6a52e9d430b96c7b04a8fbbb6f6ee66f71b77f4de4ff318b3f0c7dea00dd6695ef080cb2820c276648f6c9766adcefc381b26d76b3f673120c66181d842b2dbfac2cde151cbe6c920410bda8efeab8802f08b7768fe78a231223f6085233bda65c1e210bb1a31dd1df1a0aeebc59f44c11cdf7774d1def5906d164ea93e05c1a4840cf24937093adfec5588d04dd663ec9f9aaaeddd6d5796c0166c45383f1c004e623f1ee8b33f6b40c6e1bd39853d08ca4195aee98f2cf802dbfd3796f6759bd449ab09373fa5791cd9bdea85064d9d0abcf8569db0578986168bebaec67cdfa48ce121fb91f9109212c5021625c9588d0236dc2df98ab4c3698af40b74ce2582ebc6d5ebd97f364014cc2fac96f675399156cdc933c8f88bd84ff14c5d1118b1cba45d89aa2b3ba30068c9dee96f82e470cfbacd88a8eaee322f26097b8732fee7a6d633bfd67419d5e5ea102b958ccdfdc7c9f30f80a86e912c3700e7fb4e47f00e18f0b51bc33d15be0aac9b235f7bb4a7062b7a6ea1b18a5e0080c4f1af9bbadf767878e7e39373c811b8172c38a78c502c370331a86f53233657e39fd46b91c27f3c87cec3d20427b0257353e3c522b2efc292f0949f1a9ea2aaa38e0e01a020686e88373ea638440fa34e8b6935d06c4fcbe62f8e43121a5bc77701cb2879a857282aec2eee5196e8146d6253529496d9fa35583985fc1da35cca70785a1f4de41848d45d49974ef9315656f737d7b4e5a1101fed878b413f93bff3882a780392f65dd151f891f1e825c54e13348a60bc3192da63d76f408ba8eb920372447b2eb31fe60db1a4b5e0d4ede2bca8a1c4f66f8a95c8750cd81bcd51123aba6b41d35fbabfca372948222667de16c63bcf5e0c09680b8b1cb6cce015fa13e047dcc8c9a2defd0e48f10bce7dfc0cd572261fdda999ae45144c0ac49311ef0588de1c13002472b449e122e1e0e58f60e2f9c0f7deb9f10333894beb00d814c5d5decc20a0afe1354e056341ee64aaee7814f1476418a554f5e2831564f31075281aa35905c51be4cce368322a63a066d26785c480c1ac445a96cf27306eb1b692b27e8d39a1980066b9562999d33abaf0cd37734440d63946cfe5f0a7f12b40e2e0ec24468a3bc64476c746e15cfe4523cfa0434de75768847da0aea2a5f29f15ab5c4e2ba36d759c7256b072431f05a921a9273dd3a9763b99c155a31364a86e76afd0efc0d5dc413b85b1c4c64ccc11380a0627b24aa3861b957f377f8fe26b98580938440c0cf4e594b54f97de84af01aa51718dcd303d6efa8755affbf47c4859deb41db3832aff5c365a20dfeccc52d12b93a89304e080e209dc2e2c806ffbea7612a2f706c13d36e70f6054c96ddc09468e42616c934e8628339d0065cdee8d6a2f47ac181d079a9a429d9a9dc65551a78aae346f08023a4bd1ffce312851a40d934393b16c0bbc427b1333d3688175117dce40b29f0864fab7a8d5dada593cbfab83e70f7e5673347c1027fcac32acd253d5cd4ee1a03d3e47ad8477ed7af7cb2f7cd5a9ff6c910e11f5f88635efa691a66428699340ce2121eb9d3f538d39f1fb9b1d41c534cb17ab9a4a3c5c5318c0f0dd48611d80cf44a54cf1c5d0a32f68d879abdc946f415ace4ab3194228caebe39b1b7b4c7f8e7f48520a2300deb4c9377e3e72e51e43e76912579cb873b8e4737c93bf5c46ccad4995da4a2e9fb18beb5edfbc4c02a649e8f3f4684fcd07f3de1d2d13bc8d1d4be123409ba536a5ac258c50a95d9f1d03244073728bedcc3703dd8cc06428cb2eac31a2237be26852cbfd627d512be41b31605fb12be94882c68446c73bb8f7bd1b8fd909b134a215c15f038eb8024a525f62964defcca0a0d751d7dcf1016bd7278c864f16508cb1976fba9a3149d268a1e81356df723f778ddcc13040cf94c27cc2ab8a39b47ce0333f648f23ea6968f55ca68e0d8b017e31d1d56411ab257208d7da2d1d48785f4a2ca48dd7e4c7b1a1a391149470e77d4f2fe22f59351de300c0e9c9c59f76f68f5011b8eda22f01c26858b344a905f29de1f5790ba674e7fbcebac6136844a7a54958d4fbe1f791739561ec8338a6d93e350166d8e282ddc877d56001a7d73f38ea2921f951436de3bfa8f09d4f871639f2bc8e18572673b31f34efbbe5cb8055b660b7c0c15f254e8b1e6f754d0efcfa5e0143fd3335c0495ee0ceac165f5b25bd8b0804719f061e705946e5bb7b315722cb97dd3e2b7ef05fc7643c7d37cfe78469f5e38c9cae74c22a4ca567f7175fccdec29d6c94a367701a3ca88380d2bb208d2e3bfd120fd5b096140baec5faae73f1039787e42111ca3781e7494aad0118e154ba84dfa18330d38760c91bcc34187a852d15230f5f251b7f8e8b3c16f924d9e19cea432fd9f8471fb96c301d5ab7b9a4f8bcc351ec60a7ac407e9a018dba23baaed6be1f81460b17192b283485edaa7655cb259ddd655a3190b2a07e53e91296d5193c50277c911888cc93badb536675a088d18bc0ede2a8cf5118bf947765a2ac5b3f90850bbcec6374ca3ffce876bcfd8d6ea8ba29d54c0e27d9f95ada1b4e45a47c1db33ec62f9cb4093d7852d1479522bc80295f0cfe7c8b68a0bda7cb2836fa424fbe63d2535108b43bac7444ce1eafba48df17e6a62f0db9c314c24930ee8187c603c7214625f005475601e8c8e632ba2d9faeba4848aec48659b202aa06e2da4383a717264d88e922fed9f5d355265b072d0a7fe9d7ed7bb23befb2abceff7dc5f7737cfaf2cd03c9f2bb5519b130acc0f1858281d4364c645dbf47dd8f6225b8ad92efb43742fcccd3631e3466d349c7f75c74285f928a7260297a815b1c7dc6416f79eea2772fefae35196bcbf3fd3d11114557b7ffc2220aec0b5418d08994f418a12752d443b6a189f1704920433b5f3fd1cf54a71c6f8855bd729df51ee23e1c155884b501172f5b40f430c8814595899ec7d673f44128a274cb99d98fa040d14fa94e04a1a2937a35e3805d6df66ff3538d391c8909f20d2c058f7dd508d3fd865cf33d0ab422150547632341d024e395ce5c854c2b05e109ed398539d99ef8f5a004c4df1ca82549e0e83160caa24b0b54a48557d1a668cfd95ff1d4d0ca58572451cf04db7e1ab14f1863a2e53512af247d729fbeea7fe99016c340827188998e309930fbd74fc2de6473833682e413d7fe82effee5b4b7d9b84574cdf7cbe4d4f27b5ebf8adbaea7967e2cdcec5cef077adf8d29148717b5550f22d6355931fec3e81c1cd9c4910411db2175f59bc5e1a5ecd6d170c4449f470740c4816a56ebfb7ddba15c32cc123ec393fc47994da50b2533540141f2160d6d18a9c127a12693692ecf958f1815536b644f8d227a1efb67c3361af81ce23fc0eef2012cdfb602035c86f268c92993fe268f31a9499584cc37648e3d644bebdf40f50feb12328266c3c47ed6299f0ff6066238abf6722b6d649dc3744e80da2b811f2e749e5d5c58c00446eb37ed88193ab4e7b0fe86320b92189dc84a9fd09f2aa6ac5759d51583b9f6bfd348d0c3d1f1df312bd1e23cf4208aaddaf9c9c13fb707de9a0b615fe8a4edd8da870c00144da2d777b5bbc16d2d9aae3d877da61444244f6856e1d57da880e569a1c8e602d0145bb7da0535104c7adb21a120663694ce08e450fd23a2b9a9348ff8ab7291ce3821f593b67d86ef3ccad6b4282fbb8ad46cc188ef1d3b14e18a1aacbd090baa2abb077f5825558c38bca1e330e5dcff58682e4accf33f1d65c00b69660382fc4d32d3fb345d1e72e4dcafdb671fb1e065ab4702ce4a85e466c0cf3194136d25d67eadb2e9a676a8eb67f2a1c3789f96463487554576cc0ff817f957cfdd4822f1128102d87ae662b21172f0c76b5d220eb16e0cf2c43cc0b42ea30faec312704e894225b65b61aebed8c9c08155fcaa8fd826cbd5a61c10c9aff7bbe1fb21095952e9eeafe7b7b94a56a7b3e7fed4e417fa2e9c068ac648acb4608d9fe149f97936ff8dd453753b93ffcefab88b2785419cf4460a9e650b24c99eff0694e96c17b21cbc4f7f13a19e5dec69b1f1e75ec60305ca8531dc457a17787e4ba75b9876305bc803ceab652969a2d002cd2ce1df83ec064240427266fd4da5f40c0751f5f42e10efb9c9118e2905aab06d43477db889bff7b139bfcf17a8c11a2bb2ae28fef9ed0df37edae5a7b2e53f012c16e7fd20d44653d4453e7b7f08f52edcef2469afa650ac3a0229f134dc978fcc3b231df13804dbd66c551bdb9c84c592ed54b7fb0390bffba14ff292eefb8e03087f399c74a81c1e262c950268cf785c5fe33acf98f7420bb9d43dfd78950d7d4037cef1474b08a7bc00368d953c013988ccc7f9b5ce121ddee575ff005d3e0befa6d18fd5a2570d6bfb66489ebd8a7c07b66d6ed683ffbfefb9ffc268c0464bf14ab1be7e1b3724017978e5f969c53e89363db8c18cf35f76f4b79ef6255feb7fe8df873c9e80772b4a920a6bb7049d403c975df13b528dbc4e879f6e0c2aa1d55ada452b34917273451d22b01d423c7c69734c403d7da17689a5cbd1f1d6b5861ae987e90a48086065005470ef4aac57d1ee7c78f99cdf0d02df5eb0edd12e355753b37b9a90c99fc3345a9bdf1a8b1a6ef7192695224dbb4804f643bc36a6f7999bb9ca4d16a362611e23270268b3da872cec851a1ec50a8d1f37c5e06f0ea2946a90140fc35103d1ce95cc56de2f6e52b9d1c9c1316a59ce722754019923473a3ad4eb7a0bd3d20d8985adc370ae5a79e8f645300405cc44c426c9f4ba340cdfdd39437c9f0f889fb0baa463e24fa54334a06d65d3f16f57212cccf73eaa558465d9bf4c523b0c2b54443dd76e5964b6e76c5b9013bc0b2b198dc2f7de8adfdd30de6890a05db186ed86a603f697b888769694ab483310d03187d3a105a0027f6e3ed17119c21b8d022416784c6e2bb775b28ab7b5ad31c907d1563e1b2c8bdabdf5bfb93c0f450a4f8552bdf523232a8664a33563a157c9c8df0b08236109d2f7b711d8cfe21cd2f1c6116e6ee4cef69288c6bdccf08909140463292f7f9ad7a70133d9ef6404850d272cf3bd5e330c4311e0c049c67bf406aa2d5c221a538c44f1d5a4979ebf74a90fab1a938777fe353d65aa76ac22c4a077803bc7792d94155c9f624e2a3262462df64151191847af7630868759e4c59c2850b1e1238774347bec750c8ff1a5e5b668cd31c7761d7d1ba8d1693121812b55a27ce25eff3645bd0fb29e7fb87173b74a4c74e5404d4b0761674f9016b0485547ec4ee7e26a46f4b2cccf49ac89b62af099e08ed740372fcac4d190b7d32cf8497663cc560b3fb2500b2fe0f8c4d373885bdb5c682338af301246f95dcca9be917d5eca7dfd70b19835a7d7e775eb78fd4d449fca7d1e37f48e7a456bc29dc2b7e723f5ffb77e7b920fc62c558a5e84f3aed58650895420fbd0b8fc66e3e3be15fe21f3b586bfbfab7189e989b04fa18947e83c884ba66b87f8f252e6c46beccbe1c08a2012b8ff8b7c4ed80e40e8c77ae9efa1005a809b77bd2859b851990b0d6550f3ae83d7c385f4d88b2bb25b697f2ee150754045fe3d1ee0665e63cc3ab702f17801b1f26895b4a53b3eaa06d918132a3dd7e72d8bed14b86bc37c98", 0x1000, 0x400}, {&(0x7f00000018c0)="840177d730c76aecb92a3cf42a160bb45a85bd3ea1cdb582222e4336123c19f67c1d00ddbb0b186ad0b8d0c8823e789a4364c83a0c1151966a67e5bb399901a03fd170f87f4b5350c187141653f393055de068b8a719fcbf1a02ee471e39bbf0a90e5195d36ee7b43a04554fad7569083348bdf8f55d5bb4c20fda61610e7e13da37dffe06b669367b0a21441e3bea", 0x8f, 0x3ff}, {&(0x7f0000001980)="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", 0x1000, 0x2e1}], 0x100084, &(0x7f0000002a40)={[{@datacow='datacow'}, {@nossd='nossd'}, {@subvolid={'subvolid', 0x3d, 0x1}}]}) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000140)={0x0, 0x4}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000002c0)={r6, 0xfffffffffffffeff, 0x4, [0x800, 0x4, 0x61, 0x1ed]}, &(0x7f00000004c0)=0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0xc, &(0x7f0000000100)=0x0) io_submit(r8, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r7, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 719.581218] usb usb9: usbfs: process 15046 (syz-executor1) did not claim interface 0 before use 21:31:25 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x80085504, &(0x7f0000000240)={0x302, 0x1000001}) [ 719.624550] hfs: unable to parse mount options [ 719.639519] usb usb9: usbfs: process 15060 (syz-executor4) did not claim interface 0 before use [ 719.653866] hfs: unable to parse mount options 21:31:25 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4008550c, &(0x7f0000000240)) [ 719.707918] hfs: unable to parse mount options 21:31:25 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0xa}) [ 719.752715] hfs: unable to parse mount options 21:31:25 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x700000000000000}) 21:31:26 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x2c, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:26 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x201, 0x0) socket$inet6(0xa, 0x3, 0x400) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f00000000c0)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0x6) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540)=0x0, &(0x7f0000000580)) sendto$inet6(r1, &(0x7f0000000700)="a56942ea0307fb68a0e6", 0xa, 0x0, &(0x7f0000000740)={0xa, 0x4e24, 0x1, @empty, 0xffffffffffffffff}, 0x1c) ioctl$TUNSETGROUP(r2, 0x400454ce, r4) recvfrom$inet6(r2, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r2, 0x80081272, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r2, 0x80045300, &(0x7f0000000140)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) r7 = openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x4, &(0x7f0000000100)=0x0) io_submit(r8, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r6, &(0x7f0000000140), 0x4000}]) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000000280)={@ipv4={[], [], @broadcast}}, &(0x7f00000002c0)=0x14) r9 = dup(r0) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) bind$unix(r7, &(0x7f0000000640)=@abs={0x1, 0x0, 0x4e24}, 0x6e) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) ioctl$RTC_AIE_OFF(r1, 0x7002) getsockopt$inet_sctp_SCTP_EVENTS(r9, 0x84, 0xb, &(0x7f00000004c0), &(0x7f00000005c0)=0xb) 21:31:26 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0189436, &(0x7f0000000240)={0x302, 0x1000001}) [ 719.880181] usb usb9: usbfs: process 15086 (syz-executor1) did not claim interface 0 before use 21:31:26 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x2b, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:26 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x40, 0x0) flistxattr(r0, &(0x7f00000001c0)=""/233, 0xe9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = dup(r1) r3 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r2, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r3, 0x80080) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) sendfile(r2, r2, &(0x7f0000000140)=0x1a, 0x2008000fffffffe) 21:31:26 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x6000000000000000}) [ 719.973792] usb usb9: usbfs: process 15093 (syz-executor4) did not claim interface 0 before use [ 720.008677] hfs: unable to parse mount options [ 720.072760] hfs: unable to parse mount options [ 720.094919] hfs: unable to parse mount options 21:31:26 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185574, &(0x7f0000000240)={0x302, 0x1000001}) 21:31:26 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x7}) 21:31:26 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x33, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 720.155583] usb usb9: usbfs: process 15119 (syz-executor1) did not claim interface 0 before use [ 720.174443] hfs: unable to parse mount options 21:31:26 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000140)=0x6, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[{0x7, 0xfffffffffffffffe}, {0xc, 0x7fff}, {0x8}], 0x3) read(r1, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r2, 0x80080) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 21:31:26 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x26, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:26 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0xa00000000000000}) [ 720.262337] usb usb9: usbfs: process 15131 (syz-executor4) did not claim interface 0 before use [ 720.356285] hfs: unable to parse mount options 21:31:26 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x41045508, &(0x7f0000000240)={0x302, 0x1000001}) [ 720.398219] hfs: unable to parse mount options [ 720.438804] usb usb9: usbfs: process 15149 (syz-executor1) did not claim interface 0 before use [ 720.461434] hfs: unable to parse mount options [ 720.550239] hfs: unable to parse mount options 21:31:26 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0189436, &(0x7f0000000240)) 21:31:26 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000140)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:26 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x6000000000000000}) 21:31:26 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x7000000}) 21:31:26 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x15, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:26 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x80045510, &(0x7f0000000240)={0x302, 0x1000001}) 21:31:26 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000100)=0x4) read(r1, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r2, 0x80080) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 21:31:26 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x22, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 720.694122] usb usb9: usbfs: process 15177 (syz-executor4) did not claim interface 0 before use [ 720.703756] usb usb9: usbfs: process 15174 (syz-executor1) did not claim interface 0 before use [ 720.717561] hfs: unable to parse mount options 21:31:26 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc018557a, &(0x7f0000000240)={0x302, 0x1000001}) [ 720.739982] hfs: unable to parse mount options [ 720.756150] hfs: unable to parse mount options 21:31:26 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x7000000}) [ 720.822208] hfs: unable to parse mount options 21:31:27 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x12, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:27 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x5450, &(0x7f0000000240)) 21:31:27 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x6000}) 21:31:27 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000140)=0x80) getsockopt$XDP_MMAP_OFFSETS(r5, 0x11b, 0x1, &(0x7f0000000280), &(0x7f00000004c0)=0x60) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r7, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r6, &(0x7f0000000140), 0x4000}]) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000005c0), &(0x7f0000000640)=0x4) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 720.929351] usb usb9: usbfs: process 15208 (syz-executor4) did not claim interface 0 before use 21:31:27 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x31, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:27 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185560, &(0x7f0000000240)={0x302, 0x1000001}) [ 721.020051] hfs: unable to parse mount options [ 721.025979] usb usb9: usbfs: process 15225 (syz-executor1) did not claim interface 0 before use [ 721.061324] hfs: unable to parse mount options 21:31:27 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc020660b, &(0x7f0000000240)) 21:31:27 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x700}) 21:31:27 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x2000}) 21:31:27 executing program 6: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="624a1ba9c80d9fc9549472e66098e95a8d846af9747266732e3a2f00b804200600d01f819eb13a023a0d0861b4b02276c018e3ad6b0444f771014c21b3ecc9bc00020000377ae39849945a090300000057c098b4a04397e9283edabdc827dada9126b40f814387f4bef799afa775f1d5413c8b43c4b8743a5cfd550fd838dfff79426dabefd4df9e3b58a241d504f8219ddc3b140762b00b07464bde69a4d7b0f8e054a7e41ae893d4123a80005f23cae1e21135f67b7de1db217cfc0ab46444b4ec360fdf81d1aae257d80ae8829247dc44f3c8ad01d225f96b0f"]) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000280)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = dup(r1) r3 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f0000001900)) read(r3, &(0x7f0000002d00)=""/4096, 0x12c1) sendmsg$nl_route(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x83800c18}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@getroute={0x14, 0x1a, 0x204, 0x70bd27, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x5}, 0x40) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x80000, 0x0) ftruncate(r3, 0x80080) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) sendfile(r2, r3, &(0x7f0000d83ff8), 0x2008000fffffffe) [ 721.168812] hfs: unable to parse mount options 21:31:27 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0xb, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:27 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) r6 = openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r7, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) ioctl$VHOST_SET_VRING_NUM(r6, 0x4008af10, &(0x7f0000000080)={0x2, 0x3ff}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 721.236874] hfs: unable to parse mount options 21:31:27 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185505, &(0x7f0000000240)={0x302, 0x1000001}) 21:31:27 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x5452, &(0x7f0000000240)) [ 721.295160] usb usb9: usbfs: process 15255 (syz-executor4) did not claim interface 0 before use [ 721.306320] usb usb9: usbfs: process 15257 (syz-executor1) did not claim interface 0 before use [ 721.355489] hfs: unable to parse mount options 21:31:27 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x15, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 721.411817] hfs: unable to parse mount options 21:31:27 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x74}) 21:31:27 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x60}) 21:31:27 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x5514, &(0x7f0000000240)={0x302, 0x1000001}) 21:31:27 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x1d, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:27 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x40049409, &(0x7f0000000240)) [ 721.523889] hfs: unable to parse mount options 21:31:27 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0xc400, 0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 721.573175] usb usb9: usbfs: process 15291 (syz-executor1) did not claim interface 0 before use [ 721.583866] usb usb9: usbfs: process 15287 (syz-executor4) did not claim interface 0 before use [ 721.645987] hfs: unable to parse mount options 21:31:27 executing program 6: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = dup(r1) r3 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r2, &(0x7f0000001900)=""/4096, 0x1000) ftruncate(r3, 0x80080) ppoll(&(0x7f00000001c0)=[{r3, 0x110}, {r3, 0x1}, {r0}, {r3, 0x6000}], 0x4, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240)={0x1}, 0x8) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x7, {0x7, 0x1b, 0x9, 0x100, 0x5, 0x7f, 0x4, 0xffff}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) sendfile(r2, r3, &(0x7f0000d83ff8), 0x2008000fffffffe) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000280)=0x4, 0x4) [ 721.668812] hfs: unable to parse mount options 21:31:27 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x700000000000000}) 21:31:27 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105502, &(0x7f0000000240)={0x302, 0x1000001}) 21:31:27 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x7400000000000000}) [ 721.752377] hfs: unable to parse mount options 21:31:27 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x5460, &(0x7f0000000240)) 21:31:27 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x2, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:28 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x24, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:28 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r7, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r6, &(0x7f0000000140), 0x4000}]) setsockopt$inet_msfilter(r5, 0x0, 0x29, &(0x7f0000000140)={@broadcast, @loopback, 0x1, 0x6, [@local, @dev={0xac, 0x14, 0x14, 0x14}, @rand_addr=0x8, @local, @rand_addr=0x8000, @empty]}, 0x28) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000080)={'ah\x00'}, &(0x7f00000000c0)=0x1e) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 721.884677] usb usb9: usbfs: process 15325 (syz-executor4) did not claim interface 0 before use [ 721.899255] usb usb9: usbfs: process 15324 (syz-executor1) did not claim interface 0 before use 21:31:28 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x7a00000000000000}) [ 721.963840] hfs: unable to parse mount options 21:31:28 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x302, 0x1000001}) 21:31:28 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x4000000}) 21:31:28 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000100)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r0, &(0x7f0000000300)={0x90, 0x0, 0x6, {0x1, 0x1, 0x6, 0x3, 0x3, 0x6, {0x2, 0xa6, 0x1, 0x5, 0x401, 0x1, 0x8001, 0x3a9, 0x5, 0x6, 0x37a, r1, r2, 0x3ff, 0x8}}}, 0x90) r3 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r3, 0x4004550d, &(0x7f0000000240)) [ 722.035963] hfs: unable to parse mount options [ 722.050477] hfs: unable to parse mount options [ 722.107886] hfs: unable to parse mount options [ 722.127603] usb usb9: usbfs: process 15353 (syz-executor1) did not claim interface 0 before use 21:31:28 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x2d, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:28 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x4, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 722.192263] usb usb9: usbfs: process 15367 (syz-executor4) did not claim interface 0 before use 21:31:28 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x5451, &(0x7f0000000240)={0x302, 0x1000001}) 21:31:28 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3, 0x20000) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000200)) getsockopt$sock_int(r1, 0x1, 0x5, &(0x7f0000000180), &(0x7f00000001c0)=0x4) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x4d2a}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x4, 0x2, 0x3, 0x4, r2}, &(0x7f0000000140)=0x10) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000280)={0x6, 0x9}) [ 722.302070] hfs: unable to parse mount options [ 722.350761] hfs: unable to parse mount options 21:31:28 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r2, 0x80080) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000001c0)={r3, 0x80000001, 0x30}, 0xc) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 21:31:28 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x100000000000000}) 21:31:28 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) 21:31:28 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x6800}) [ 722.380674] hfs: unable to parse mount options [ 722.395974] hfs: unable to parse mount options 21:31:28 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x39, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:28 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x4, 0x3, 0x4, 0xaeb}) 21:31:28 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x35, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:28 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x8010550e, &(0x7f0000000240)={0x302, 0x1000001}) [ 722.512438] usb usb9: usbfs: process 15402 (syz-executor4) did not claim interface 0 before use [ 722.522414] usb usb9: usbfs: process 15401 (syz-executor1) did not claim interface 0 before use 21:31:28 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000080)={'veth1_to_bridge\x00', 0x2a3d}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0xfffffffffffffffc, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:28 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x4800}) 21:31:28 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x7a00000000000000}) [ 722.626602] hfs: unable to parse mount options [ 722.713964] hfs: unable to parse mount options [ 722.740410] hfs: unable to parse mount options 21:31:28 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000100)=0x7, 0x4) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x1, 0x0) socketpair(0x11, 0x800, 0xc000000000000000, &(0x7f0000000080)) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000040)={0x0, 0x3}) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40001000000, 0x40) ioctl$FS_IOC_FSGETXATTR(r2, 0x4004550d, &(0x7f0000000240)) 21:31:28 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185507, &(0x7f0000000240)={0x302, 0x1000001}) [ 722.775717] usb usb9: usbfs: process 15432 (syz-executor1) did not claim interface 0 before use [ 722.786900] usb usb9: usbfs: process 15431 (syz-executor4) did not claim interface 0 before use [ 722.815417] hfs: unable to parse mount options 21:31:28 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x36, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:29 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x37, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:29 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x4}) [ 722.976268] hfs: unable to parse mount options 21:31:29 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r2, 0x80080) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f00000001c0)=""/189) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 21:31:29 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x401, 0xffffffffffffffb2) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000900)=""/216, 0x175, 0x40000040, &(0x7f0000000080)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x364) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socket$alg(0x26, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000380)=""/221) r6 = openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x7}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r6, 0x84, 0x7b, &(0x7f0000000280)={r7, 0x200}, 0x8) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r8, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:29 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x100000000000000}) 21:31:29 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x8004551a, &(0x7f0000000240)={0x302, 0x1000001}) 21:31:29 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x8000, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000005, 0x13, r0, 0x0) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x4004550d, &(0x7f0000000240)) [ 723.050907] hfs: unable to parse mount options [ 723.063977] hfs: unable to parse mount options [ 723.115591] usb usb9: usbfs: process 15469 (syz-executor1) did not claim interface 0 before use 21:31:29 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x32, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 723.160802] hfs: unable to parse mount options [ 723.179775] usb usb9: usbfs: process 15480 (syz-executor4) did not claim interface 0 before use 21:31:29 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:29 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) open_by_handle_at(r0, &(0x7f0000000000)={0xaa, 0x1, "df9ddaadeabf096efe6659f6392615fb540d4b6e19944f82c206a523a0172a557c94eb9fcba154035b3b525fa5f0ccedcf81a18f5301ffcf353463331c3f749838421fb4790004c4d72aaf3fb25eda1a1a58ff344b49eb2d3b4f9d1f9ad47b70cc531562364e61940da7d2f8e2d543f886ffcd5e8f25807704eeddeb359553416ee291662aba387ea0c17f7a13e057b84f10d5b7f9d10a1e89f450622032bf30435f"}, 0x883) 21:31:29 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x4c}) 21:31:29 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x7a000000}) 21:31:29 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0045878, &(0x7f0000000240)={0x302, 0x1000001}) [ 723.308967] hfs: unable to parse mount options 21:31:29 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 723.372349] hfs: unable to parse mount options [ 723.411304] usb usb9: usbfs: process 15501 (syz-executor1) did not claim interface 0 before use [ 723.440281] hfs: unable to parse mount options [ 723.446327] usb usb9: usbfs: process 15509 (syz-executor4) did not claim interface 0 before use 21:31:29 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x23, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:29 executing program 0: ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x4004550d, &(0x7f0000000240)) [ 723.491560] hfs: unable to parse mount options 21:31:29 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105500, &(0x7f0000000240)={0x302, 0x1000001}) 21:31:29 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x2}) [ 723.605933] hfs: unable to parse mount options 21:31:29 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) fallocate(r0, 0x939213128e3b4cf6, 0x8001, 0x100000001) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r2, 0x80080) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) sendfile(r1, r2, &(0x7f0000d83ff8)=0x37, 0x2008000fffffffe) 21:31:29 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x27, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:29 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x7a}) 21:31:29 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x200800, 0x0) getsockopt$inet6_int(r0, 0x29, 0xfe, &(0x7f00000000c0), &(0x7f0000000140)=0x4) r1 = socket$inet6(0xa, 0x3, 0x3a) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r2, 0x400454ce, r4) recvfrom$inet6(r2, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400000000400200) ioctl$BLKGETSIZE64(r2, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e23, 0x6, @mcast1, 0xf4c3}}, 0x75f1, 0x0, 0x100, 0x3, 0x8}, &(0x7f0000000280)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000002c0)={0x8, 0x7, 0x3, 0xfffffffffffffffb, 0x7, 0x8, 0x3, 0x5, r7}, 0x20) setsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 723.703872] usb usb9: usbfs: process 15536 (syz-executor1) did not claim interface 0 before use [ 723.705315] hfs: unable to parse mount options 21:31:29 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0xcec, 0x400000000000001) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000040)={0x60a, 0x202, 0x1ff, 0xb3f, 0x0}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000100)={r1, 0x23}, &(0x7f0000000140)=0x8) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000180)={'broute\x00'}, &(0x7f0000000200)=0x78) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f00000000c0)={0x1, 0x10001, 0x6, 0x4, 0x3f, 0x8, 0x581}, 0xc) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f00000012c0)=0x20, 0x4) pwritev(r0, &(0x7f0000000000)=[{&(0x7f0000000280)="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", 0x1000}], 0x1, 0x0) 21:31:29 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185568, &(0x7f0000000240)={0x302, 0x1000001}) [ 723.796148] usb usb9: usbfs: process 15544 (syz-executor4) did not claim interface 0 before use 21:31:29 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 723.848982] hfs: unable to parse mount options 21:31:30 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x68000000}) [ 723.916850] hfs: unable to parse mount options 21:31:30 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x5421, &(0x7f0000000240)={0x302, 0x1000001}) 21:31:30 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0xa}) [ 723.965120] hfs: unable to parse mount options [ 723.968694] usb usb9: usbfs: process 15572 (syz-executor1) did not claim interface 0 before use 21:31:30 executing program 0: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$P9_RUNLINKAT(r0, &(0x7f0000000200)={0x7, 0x4d, 0x2}, 0x7) getsockopt$inet_tcp_buf(r0, 0x6, 0x21, &(0x7f0000000100)=""/139, &(0x7f00000001c0)=0x8b) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x5) ioctl$FS_IOC_FSGETXATTR(r2, 0x4004550d, &(0x7f0000000240)) getpgid(0xffffffffffffffff) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e24, @loopback}}, 0x3, 0x20, 0x401, 0x8, 0x2}, &(0x7f0000000000)=0x98) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={r3, 0xfffffffffffff3f8}, 0x8) 21:31:30 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) setsockopt$inet_dccp_int(r1, 0x21, 0x10, &(0x7f0000000080)=0x1, 0x4) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000000c0)={@empty, @local, 0x0}, &(0x7f0000000140)=0xc) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000280)={@remote, @loopback, @empty, 0x1, 0x4, 0x8000, 0x500, 0x4, 0x400100, r6}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r7, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:30 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x29, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 724.078761] hfs: unable to parse mount options [ 724.112869] usb usb9: usbfs: process 15582 (syz-executor4) did not claim interface 0 before use 21:31:30 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x7a00}) [ 724.182217] hfs: unable to parse mount options 21:31:30 executing program 0: uname(&(0x7f0000000280)=""/4096) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) 21:31:30 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x31, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 724.233154] hfs: unable to parse mount options [ 724.294256] usb usb9: usbfs: process 15604 (syz-executor1) did not claim interface 0 before use 21:31:30 executing program 6: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) fadvise64(r1, 0x0, 0x8, 0x0) r2 = dup(r0) r3 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r2, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r3, 0x80080) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) sendfile(r2, r3, &(0x7f0000d83ff8), 0x2008000fffffffe) 21:31:30 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x40049409, &(0x7f0000000240)={0x302, 0x1000001}) 21:31:30 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x7400000000000000}) 21:31:30 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x23, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:30 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) shmget(0x3, 0x3000, 0x2, &(0x7f0000ffd000/0x3000)=nil) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x4001ff) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r5, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) set_tid_address(&(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e21, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x10001000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0xffffffff, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x14b) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 724.376977] hfs: unable to parse mount options 21:31:30 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) clock_gettime(0x3, &(0x7f0000000000)) [ 724.447998] usb usb9: usbfs: process 15624 (syz-executor4) did not claim interface 0 before use [ 724.449146] hfs: unable to parse mount options 21:31:30 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x6c00000000000000}) [ 724.510613] hfs: unable to parse mount options 21:31:30 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, &(0x7f0000000240)={0x302, 0x1000001}) [ 724.557477] hfs: unable to parse mount options 21:31:30 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x500000000000000}) 21:31:30 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x25, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 724.633354] usb usb9: usbfs: process 15649 (syz-executor1) did not claim interface 0 before use 21:31:30 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x17, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:30 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000080)=""/78, 0x4e, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xffffffffffffffc0, 0x10010, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) r6 = openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r6, 0xae04) ioctl$NBD_SET_SOCK(r6, 0xab00, r1) io_submit(r7, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) ioctl$EXT4_IOC_RESIZE_FS(r4, 0x40086610, &(0x7f0000000280)=0x10001) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) r8 = pkey_alloc(0x0, 0x2) pkey_free(r8) 21:31:30 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) fcntl$addseals(r0, 0x409, 0x6) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000100)) 21:31:30 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpgrp(0xffffffffffffffff) setsockopt$inet_tcp_buf(r0, 0x6, 0x3f, &(0x7f0000000440)="e771190e35438d3f246ba6b2260a291e54b1f60fe1c61f5a17791dcf4c85ec5c05ab0d218358972de970b62c901817fc6d312d3f8bd524767def0039680a6d3e5492c7c4e5136ddde0aea9a56adccbbbe575d7de33e7c76cde473a7ef1d8cdb53f520cb0713516d339dadb819979af32e2a24a4e3c1ee9c1ba2df27ea275bf318bdfa05ee8e92531dbdaf7e675033ad4be42fc388bf2d3705a067817c13d3bca13336d4b244d40fd7f8909cf6765e687878e2c0564247a281caa61bbbe68b871b75e9749de5ccc1a68aa5ceb4fba2335840497ae3fe6b07e32b460bb3b61fc5230a05222bcb9846555ccae595724", 0xee) sched_setscheduler(r1, 0x2, &(0x7f0000000040)=0xffffffffffffffff) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/.et/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r3 = dup(r0) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r3, &(0x7f0000000900)=""/4096, 0x1000) write$nbd(r0, &(0x7f00000001c0)={0x67446698, 0x1, 0x4, 0x2, 0x3, "fa7eca1f8e54ca13f060bd1ebabf05bd98e5f44343a1ca9afb3b0a77a01a2cd2c3d68c9420a597cb3e15797d6ca7808c441423025666aa09a1a2"}, 0x4a) ftruncate(r4, 0x80080) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xf, 0xff, 0x0, 0x2, 0x2, r0, 0xc5f}, 0x2c) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000100)={0x7f, 0x1, 0x3, 0x31, 0xffffffffffffffcc, 0x8}) restart_syscall() write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000003c0), 0x13f, 0xb}}, 0x20) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x4, 0x200, 0x1, 0x1, 0x6}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f00000002c0)={r5, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @broadcast}, 0x1ff}}, 0x6, 0x7, 0x1, 0x5, 0xff}, &(0x7f0000000380)=0x98) [ 724.725208] usb usb9: usbfs: process 15657 (syz-executor4) did not claim interface 0 before use 21:31:30 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)={0x302, 0x1000001}) [ 724.796988] hfs: unable to parse mount options 21:31:30 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x300000000000000}) [ 724.820282] hfs: unable to parse mount options [ 724.870376] hfs: unable to parse mount options 21:31:31 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x500}) 21:31:31 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x1a, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:31 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0186600, &(0x7f0000000240)={0x302, 0x1000001}) 21:31:31 executing program 0: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000040)=""/114, 0x72}, {&(0x7f0000000100)=""/84, 0x54}, {&(0x7f0000000180)=""/17, 0x11}, {&(0x7f00000001c0)=""/14, 0xe}, {&(0x7f0000000280)=""/109, 0x6d}, {&(0x7f0000000200)=""/22, 0x16}, {&(0x7f0000000300)=""/98, 0x62}, {&(0x7f0000000380)=""/110, 0x6e}], 0x8, &(0x7f0000000480)=""/210, 0xd2, 0x200}, 0x2040) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x4004550d, &(0x7f0000000240)) 21:31:31 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3a, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 724.993678] usb usb9: usbfs: process 15691 (syz-executor1) did not claim interface 0 before use 21:31:31 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) fcntl$getflags(r1, 0xb) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:31 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = dup(r0) getsockopt$inet6_dccp_int(r1, 0x21, 0xa, &(0x7f0000000140), &(0x7f00000001c0)=0x4) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000240)={{{@in, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) getresgid(&(0x7f0000000380)=0x0, &(0x7f00000003c0), &(0x7f0000000400)=0x0) fchownat(r0, &(0x7f0000000200)='./file0\x00', r3, r4, 0x1d00) read(r1, &(0x7f0000000900)=""/4096, 0x1000) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f0000000100)={0x3, 0xffffffffffffff9c}) write$FUSE_ENTRY(r0, &(0x7f0000000440)={0x90, 0xffffffffffffffff, 0x7, {0x0, 0x1, 0x6, 0x1000, 0x6, 0x8, {0x4, 0x40, 0xe6c1, 0x4, 0x1, 0x70, 0x6, 0x8, 0xc6, 0xe000000000000000, 0x3f, r3, r5, 0x8, 0x4}}}, 0x90) ftruncate(r2, 0x80080) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) sendfile(r0, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) [ 725.073507] usb usb9: usbfs: process 15700 (syz-executor4) did not claim interface 0 before use [ 725.095820] hfs: unable to parse mount options 21:31:31 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x700000000000000}) 21:31:31 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x302, 0x1000001}) [ 725.160222] usb usb9: usbfs: process 15700 (syz-executor4) did not claim interface 0 before use [ 725.161362] hfs: unable to parse mount options [ 725.195374] hfs: unable to parse mount options 21:31:31 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) 21:31:31 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x2000000000000000}) 21:31:31 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x6, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 725.338462] usb usb9: usbfs: process 15732 (syz-executor1) did not claim interface 0 before use [ 725.347710] hfs: unable to parse mount options 21:31:31 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 725.386883] usb usb9: usbfs: process 15741 (syz-executor4) did not claim interface 0 before use 21:31:31 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000000)={0x0, 0x0, 0x4}) 21:31:31 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x8008551d, &(0x7f0000000240)={0x302, 0x1000001}) [ 725.469485] hfs: unable to parse mount options 21:31:31 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x28, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:31 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x68000000}) 21:31:31 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0xa00000000000000}) [ 725.577378] hfs: unable to parse mount options 21:31:31 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) uselib(&(0x7f0000000000)='./file0\x00') 21:31:31 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000240)={0x302, 0x1000001}) [ 725.641583] hfs: unable to parse mount options [ 725.648003] usb usb9: usbfs: process 15769 (syz-executor1) did not claim interface 0 before use [ 725.670332] usb usb9: usbfs: process 15774 (syz-executor4) did not claim interface 0 before use 21:31:31 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000001c0)={0xe993, {{0x2, 0x4e22, @multicast1}}}, 0x88) read(r1, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r2, 0x80080) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 21:31:31 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f00000000c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0xffff, 0x200200) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:31 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x37, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 725.743972] hfs: unable to parse mount options 21:31:31 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x2000000}) 21:31:31 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x60000000}) [ 725.790128] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor7' sets config #770 21:31:32 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x4004550d, &(0x7f0000000240)) [ 725.883311] hfs: unable to parse mount options 21:31:32 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x21, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:32 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f0000000240)={0x302, 0x1000001}) [ 725.924494] usb usb9: usbfs: process 15800 (syz-executor4) did not claim interface 0 before use [ 725.954696] usb usb9: usbfs: process 15804 (syz-executor1) did not claim interface 0 before use [ 725.999752] hfs: unable to parse mount options 21:31:32 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) r6 = openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f00000000c0)=0x0) io_submit(r7, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r6, 0x84, 0x1e, &(0x7f0000000080)=0xffffffffffffffff, 0x4) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:32 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000000900)=""/4096, 0x1000) setsockopt$sock_void(r0, 0x1, 0x24, 0x0, 0x0) ftruncate(r2, 0x80080) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 21:31:32 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0xa00}) 21:31:32 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x22, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 726.091763] hfs: unable to parse mount options 21:31:32 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x2, 0x101000) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) timerfd_settime(r0, 0x1, &(0x7f0000000000), &(0x7f0000000040)) 21:31:32 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x6c00}) [ 726.186858] hfs: unable to parse mount options 21:31:32 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x80045519, &(0x7f0000000240)={0x302, 0x1000001}) [ 726.233147] usb usb9: usbfs: process 15833 (syz-executor4) did not claim interface 0 before use [ 726.245880] usb usb9: usbfs: process 15834 (syz-executor1) did not claim interface 0 before use 21:31:32 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x34, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 726.281154] hfs: unable to parse mount options 21:31:32 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) [ 726.329893] hfs: unable to parse mount options 21:31:32 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x4c00}) [ 726.387501] hfs: unable to parse mount options 21:31:32 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x7a00000000000000}) 21:31:32 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x2, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 726.459976] hfs: unable to parse mount options 21:31:32 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$sock_int(r0, 0x1, 0xc, &(0x7f0000000280)=0x401, 0x4) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000080)) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) r6 = openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f00000002c0)=0x0) io_submit(r7, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) getpeername$netlink(r2, &(0x7f00000000c0), &(0x7f0000000140)=0xc) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) write$P9_RLOPEN(r6, &(0x7f0000000100)={0x18, 0xd, 0x1, {{0x40, 0x1, 0x7}}}, 0x18) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:32 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x8080) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0xfffffffffffffff7) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x100000}) 21:31:32 executing program 6: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x181080, 0x0) accept(r0, &(0x7f00000002c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000340)=0x80) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000380)={r1, 0x1, 0x6, @remote}, 0x10) perf_event_open$cgroup(&(0x7f00000001c0)={0x3, 0x70, 0x5, 0x278, 0x101, 0x7, 0x0, 0x6057, 0x20000, 0x2, 0x92c0, 0xfffffffffffff7c5, 0x0, 0x4, 0x46, 0x0, 0x5, 0xffffffff80000001, 0x6, 0x5, 0x7fffffff, 0xfffffffffffffc01, 0xc64, 0xec, 0x400, 0x40, 0x400, 0x9d, 0xffffffff, 0x5, 0x80000001, 0x2, 0x81, 0x5, 0x6, 0xbb, 0x2, 0x3, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000180), 0x2}, 0x2000, 0xf18, 0xa2e, 0x2, 0x401, 0x57, 0x40}, r0, 0x7, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f0000000100)=""/80) read(0xffffffffffffffff, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r2, 0x8007f) sendfile(0xffffffffffffffff, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 21:31:32 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x80045518, &(0x7f0000000240)={0x302, 0x1000001}) 21:31:32 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x12, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 726.555766] usb usb9: usbfs: process 15871 (syz-executor1) did not claim interface 0 before use [ 726.568575] usb usb9: usbfs: process 15872 (syz-executor4) did not claim interface 0 before use [ 726.628979] hfs: unable to parse mount options [ 726.709141] hfs: unable to parse mount options 21:31:32 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x400000000000000}) 21:31:32 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x7a000000}) [ 726.744929] hfs: unable to parse mount options 21:31:32 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)={0x0, @aes256}) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) 21:31:32 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000800)={0x0, 0x1000, "ed14705acfaa299dfffcddb3e221a404f463708af2cc29d5037ad2c3e7f0c7912b57a798f530f0ccafae0a4849c650c279289f9fae46fc2a46bde1622ecb4f3fbc25c30b8671d874b0461374d10f98d29bc03dac5bbab82648d906d04b68afa02ba42c6e5e2fe2c61a4bda4da8401744c2fb994374b56a723c8c9f63747cd1799a6090f0acc29c58dc7a6aadfb98d06dc4a086be5a495e639db497e513c0cb432dc3d6d3726c64de85c7c66f9446fc1fe592b9dc8102852484e96d038ca5e617663837c04cd6be680d24dac0454e7bd57ea84ce49dc4f7abe81726ac125c5f5aa55890439f98ea8c6c2d1e62bbcf82a9ff54c200eb33557086aeb944387230979c2dce7a7027d50da16a44958a7117d29b7e63742dd7a8358b447e9ad4bddc18f259a413a4c9a8a6ae468052ae7999debb47f68541f7bdc8bfd950782fd41e166ffd12eca8e392c1226d38bb55d2ca5da9b16c62cc295ea618192c800413a05dd2afd493f46e39a9ec9585bf40c6ce9d498b9256748f5a65120f2ec35343a37b17774584f977ce2dedfb4a62a6adcebb49ecb567c18dfcf4bec8abc769916fb1e286ef57023c40a72cd797bdbc26f1f7ef290f9b42ab705e392a9e88cf83f9472bd4365fc8d115f074f902ff4aaa947e18c46fd373f37de818c530886bdf22dc888e88a8cdbb16051e239533ad3e5636bde7330ae380d3c8233723951c61264e4895ef49c4a8f27ee0c49560f5e380c20640583873113d38e2b19c8fa329d2436966813aee1ec0fe0314b67dd91cc0915c81e657b94392e340a9ca4622144a251b959cd45befeaf578192279e410012b60ec1d5b32d8a57b887e5be3466247b772190c3c0df6c75da3f6cd0ea2a91795c1433ac7601d433c24be586caf0858faf4f0238887645b0a131c57778aa3061da4b717f3caf6a115eace5d792ef6ec8ae00df83bd89901ad3ad23d7dd702640a721f324a11ba63888033a7e3266bc61c9c1c976ecb24718aaa137747c8e6c7bb43c418aa153243527c135c777c1b232edea8b51c96104c596283732c213b4de77d0e4de2f12c1eb4b9b608a9f3788184fa93bba676475e588fe9a6b8dc18800be00171714c49cc76684ec82206dcfae7fb3e00a50f31794a5dbd71e2de1efe51ecb64b1effe6c9a91529c0c8d9387666e9edc585efa4cfff105f0b8516a4bd4a7ade958808b15f71a4315e5aeb14a89e592f678d8208e547e6cd14e6545e35e236d68e3913b52b52a22190a1cb7ec109ee6557de9009c4f183a51106e649e61341eb76657f452d1ae36395874ba8b9761ab7a4c0d75db7c482228ab34bf854963b4c6fc565373f1ac766524190785f37ba46b326b84a644f1d06f2e8aaf40910a82f730cfd2689839ad8d7ca8b6c62de3388491221e360314dc77502244ad66d1b931076a992040a220e4bdcbd90ed2f6e6d654f1f32d44b8b5173c5cfe57071ad092ffd51e7a698832e72753cd560ace016613942613a406f6a4e12cc9a5a13ab6a1174988c1a92108d46dcc201fb87df745f19da16ebe8ccab5c6e06306f344d1df7a806c36cf23634f427e73df306df69275930fa3040363992543d6cd7afdeb267da9ec040c8f8835db71027a19e49b7107d57d4b42e67599e69be8c0f1e8bd5bc102122ec059a4dec341a316e02a8debfd2556a3aa53405dc79984dd31a633713d6987cd94043de06d01693b0c6af47887dbb2c95e2119475f5eba80d207af40d1444fc87880e7673a2f002eefe01ccb7fa7058309da0f150616e918a07964a7c1308c3f84b00ab40a3f911d4b77a13cfe80fab403fdc5f8c22de229b5f4fa1b8770982ba557e3234993196010c8d4577fa21c37150acfa763b5c0390a371f9c1766c86b3b653cce1ca2df0c839bc6086a785e4e57d1583ba67180fe979952d575145f8caa59ed55450e688b469c708c36ef0641bfcdcdcedd1406748d40751db74a3fc71988ffe5c98303853d2eede57770b180a9e8569653bd60f788d5594d61063217dc957272278a235f2f90b505aacb4f122fd65a6d302d8d87be8e03e67c883b4dbded69360c88e41eb2d49cac596df7ec4bf0d57c55b2e4b76e69c3e809c32e67f3803a1364173adb2fb86d2d39e1d08ee0b2d1f7d5aebd71530e97731363f9d73130035799c0a2708a4bf3a0a5471c0877b6e8a5e8c9c4da71003e9d935204ec607a62fa11d9b3e5955a602c771c26ed2d85c711bde8e3aa6aa3b00517520ab460b2983c501a7bfe2c32cba0be259ccb7017ec9cf0514045de4ccccd6303a8aef078c605f78f8053e57e7fb7c76831a4455f7129a233557f96273f606145596fd9f2a4e5229a6a01429eb698b1ed5de3ce002dd1028328a4cff3dff53f00326aa1a2ccb46273cd1965802b4adb0264f0a4975b49529a81169401603f8616f21e358315aceba40ccde5b52089897c3b4f5121868e79e3466f0cadfb1a464562046bc426b0ed582d0eabf9eadbbd871e714e691a20bf4ce83cb3ed043e2f4c1090e89591953978b5ad9be0fa94a86a07a42a819ddaf11e9dd416bdcd211a3d14a00cb5a745a741f4c1356588c679461b530d79c1c258cc6a85fd44ab3160c6d4af6e04fcf130be07d38a776f2fbc1cd5149e7fd79e5339331c7780ea9ce14a55217b8acbe6dc817e9bbd7f89cb5e6dc7bc9cc6718833e9a94658ef89f7286f93e70c3882caccbb9376386a7ebf127d7c7e7a999a089af2d36448622acdff7a4899490ace4a83e18fbc3085fc4a7d8d5e8a3c09de6335e36264b2b855905f3a9f1f4a91fc9057cb15d7b3149d971e8c68b1dc0351f2b0f2288a0e6ac2e7c3c94344c8410740117d68738dea93628b07d60becb26a7a6e5e4fb5e3f5475bd1efaeeb16c0db31aad2ac17cd78e2bf097e6e306732f2c1c2c700643bafc7671ce3b7c59193b79a53d52d50a8b35a168f02195090e221fd089bf9533b094d828997ae1ed3479d25e993a78a4e5a61d5234155c552400cc29fee3f6ad221fa7293b5f41644a1c7616ef5b9bd686b318fd3fd42dce85420a4b0915bef9bfc1d1d1d534a38270fc08351e7cf4ea0b91c01034f4cb17cc34a30a3a065fe19e87f96012d31ed3102c5fa2316f10fa71402e8e39c45c8a12597beabd4376e090d536f5e262c5f03020fd5f2c63757d322701d0890ded46ecbbb9ed3ad3aabfee284feec67fc32a480f8849d1b036b28b4f374c521ad1154f62219d33a2238676defc262cd6287bea976ccee3b67b5360f40125e46d05382621a3dcc3be940193da878c60b8c93c38cdfde65cf84f6296c2940e3582318e72822217daa4439fe93dda06bf1168514b7931f4535aaa55d15e50b19a808fc77fd685c72c1c05b675298912133d23e5ae3e5463b459bcb4bdcb692ec9b5a1e97e27cb8800cd9d06b259c4bbce89d5f828fa9c7e6a552915514b2865338b657b1f8c2295fbc7dbc834bfa8cd7e7eeaac669b48afebb73f07579182bb2e631c05d08a119335633689081a0e43348cdc1436d1c74401a6ff4ed82c8a1cd25d2c915748a33bfac0c80376d19988c9c77db1cf186785a672373067da1a77c68e666cc4e899377708f4bcd4372f2ff1dbae61c1330a5fb62f662be63a86d4fb157ae818d1caca040902a7d8baf9f5cfd562ae57f026208d213ac64a6c4b7053ebd58a7158f80d09e598350ec43fd0a369ceb69fe6833aee61dd214920658a831fd03478f22016d94eb8e9a9461c6eac8831fbd532f132f2ed99dd45a11920f8f7439614db5a81d4bb9c77b1343d3869460ebb25f7cd09dad5d7283c54c2b5dd6493e41b47ca263e0088daaa2a74c2e014799af5f2eabbcf746bc16f5211dce2dad40fad32c54792e2656127ffbbbd1a70c8662247a001eed139bd3c21184e17625a6156401dd05ac0a0be0fa9fe605175e09c8e607ec1b8eeabd49437e2ce7c94df4ae57323a28c0654d6b8603b2c4ae4617799248bcaa7870265fd03c669f44d65c1bb3d1dc7a32c0ff6001d2f6837c005aa081630f72e798734ceda8a8303bd1c4e6a11dd61f338e028ee995a12ef16161d99f9a2cabd40972385461091ea747e1d18c083b7dd11e8530045469161ab9bbacbe4c104cd54a219ddab6c00dcb1c1581c780fb4f186ef2db7cc2d79d9c2337c6412c2b77a231d323a464372ba9bd4803d480ea7ae1d75c165165a81c645b6de5e4d3c1e80e8555a38fadc0f436fdbf8707ab917d8d52be0eaf864251905bf824d019679a04f96222d902e8573bc5a468eeecfa0ce8bd8ec1601dde6d8ed5b825cf3bf872684d5f20a380f31ebb6f1ff28b0f57a8994b7df933c04614c674045e52d230f59cb0eac673a1b698f67ea3201abb7c12edd110b800c46fbf5d0629b9382821f6ea27ae8238b3901c663525df3ab522ab8f77dfe066762534b816eec66d29684d32a684803081021a05682db06323119d2b2fd6c5bb476026d99d5405123203ae7433cce8e861a42a6dc93b38c96afc60dcffb7bd3d7a13bd63e60194842989cd52b4c3999033d8165ae4ca5d45d1fcb9d13582cf67917e6dc88517367c182fc098b3fbee2cba1dda196792ed17e63166c38d2ffa154688997756ab02a61acac0472b2718204195d1c5d9cd45ea8836a353cc747576ac997cb81777f3e5cf7aa76a6b31440d8b6ba4b6bd176ca271afe88af5e7f1d7ffbef466451e6f1136cc4eff4552632a418e73b2076ee77aa74b6f1be2d35ab22f835da58ce0d79a1aca592679b4d2c985a5e5d4f31b9dcb053dcdf0e618a9222eb8b77a700e1bd726d0a1963cb1136e935dfe82acb545f8974238b280021a93e355b0601cd1bff91fcd8a1d417fa70211d6a50d25b917e6febc366f73a3debbdef5103ac879bcabd8dde409504ca555e5aa4f9f38dca2b26a48cd4b6543bd3f4152d977bcce59f7627dd0b3437de73070b025a5aa66934eb785f0ef1de3f04295d03883c5145139382316b0e51b0aa0d55453a59cd872939169e32f49f693db07df21f50d901e72060fd8e536e018e9add8332a002b4c74d03a5c7ec67192b9a5a7d00014a30c307459be7dd0a9779f98e3e5f215cc161ab2b44991ad5401e96ca31edfba3c4ef0e24150687e15bc6d9a76bf2349e5cfb49427a306a54b14e0a7f324cb8d28ead9c387a61b4016bc3a154d74269a62992b3ecf69ed0425f4d3b4a8246296fb1818398cdef99d4685cc4a8c5c2f034cec6b6532bb6b2e09806b61c133ab26eef14008e5966e1df5ec825bfb5b5550a7b471ce745d5bd940b31b8b1a62567e0f39cc2aa78b73dff5744e415b6831a57d317d090f98f08a19292e909799b309bf78d54255fa34ac06cc61e6b04e01bf0dedbc2599001678925874b492c839a7316cac2d6ecc97f2d386c7b31e3a06cf5ae5f07ebfd10e780657ba581b90c84136a754a4a0c3106ab49e4cc78fb137a2f1bae271db2d3b9ddabece28226b4cad287230e572fb64b8b574437f4e68f8ad0016d73795a51cdcf39c68f7173ed69b3ddb8f3f3b820e47e948a05c5ca9d1e2f9db5c89ac029bf341eebbe919a3c9350983cfe78dbebf4f67403662286a3bd17e75bf6398a8c1cce7f8b54fa821d90fead70735ce59351000c3061157a626c6c4ba067dd6e68c76b7180b4b0375cb537c7edb42701a9a1cecaf467979ad0f1bb407d10e535a0b85fa89579401bb85036576514a931cea70311b4b054594cf7c2196678188c56dd88ac2ab5706eb067b7ba9b69a099260531df83e2f0422010659e3c6e4faba31eba012d82a8c85f6d51942486e4f73247c5f36d"}, &(0x7f0000000140)=0x1008) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000700)={r4, @in6={{0xa, 0x4e20, 0x1, @mcast2, 0x7}}, 0x10001, 0x10001, 0xffffffffffff8001, 0x0, 0x6}, &(0x7f0000000280)=0x98) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f00000000c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) r7 = openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r8, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r6, &(0x7f0000000140), 0x4000}]) ioctl$SG_GET_KEEP_ORPHAN(r7, 0x2288, &(0x7f0000000040)) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:32 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x11, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:33 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc018556c, &(0x7f0000000240)={0x302, 0x1000001}) [ 726.842805] hfs: unable to parse mount options [ 726.882445] usb usb9: usbfs: process 15910 (syz-executor4) did not claim interface 0 before use [ 726.917816] usb usb9: usbfs: process 15912 (syz-executor1) did not claim interface 0 before use 21:31:33 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0xf, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 726.977990] hfs: unable to parse mount options 21:31:33 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc018554c, &(0x7f0000000240)={0x302, 0x1000001}) 21:31:33 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40000, 0x0) write$P9_RSYMLINK(r0, &(0x7f00000001c0)={0x14, 0x11, 0x1, {0x4, 0x0, 0x8}}, 0x14) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = dup(r1) r3 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r2, &(0x7f0000001900)=""/4096, 0x1000) ftruncate(r3, 0x80080) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) getsockopt$inet_dccp_buf(r1, 0x21, 0x80, &(0x7f0000000900)=""/4096, &(0x7f0000000100)=0x1000) sendfile(r2, r3, &(0x7f0000d83ff8), 0x2008000fffffffe) [ 727.012662] hfs: unable to parse mount options 21:31:33 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x300000000000000}) 21:31:33 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = semget(0x1, 0x3, 0x20) semctl$GETPID(r1, 0x0, 0xb, &(0x7f0000000100)=""/239) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x1, 0x6, 0x2, 0xffffffff, 0x82, 0xe92}) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) 21:31:33 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x3f000000}) 21:31:33 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_thread_area(&(0x7f0000000080)={0x3, 0x20101800, 0x1000, 0x1, 0x7fffffff, 0xf322, 0xb2ad, 0x6, 0xc175, 0x100000001}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x1, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1d, &(0x7f0000000800)=""/249, &(0x7f00000000c0)=0xf9) 21:31:33 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x34, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 727.142239] hfs: unable to parse mount options [ 727.226344] usb usb9: usbfs: process 15951 (syz-executor4) did not claim interface 0 before use [ 727.245963] hfs: unable to parse mount options [ 727.248433] usb usb9: usbfs: process 15959 (syz-executor1) did not claim interface 0 before use 21:31:33 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x8008551c, &(0x7f0000000240)={0x302, 0x1000001}) [ 727.288481] hfs: unable to parse mount options 21:31:33 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000040)={&(0x7f0000000280)=@newtaction={0x5a8, 0x30, 0x500, 0x70bd29, 0x25dfdbfc, {0x0, 0x8, 0x8}, [{0xac, 0x1, @m_ipt={0xa8, 0x1, {{0x8, 0x1, 'ipt\x00'}, {0xc, 0x2, [@TCA_IPT_INDEX={0x8, 0x3, 0x8}]}, {0x8c, 0x6, "ef467de467cb1d886185e4363bc46b39f99d5ccddee58700f73c7fbc36d95fd12d9edba61418a9a481706b6d051bba2e21beabf21d5e9b42b2f7731c1b924ba4a868bd7e760fac93b0e6052f9bf19f5bac8fecdc2dd468c1fbd302f2d31f10a838f8c61b5c3779e3a688e0de89dad14ed76dc80dd64ae7df32f8c09085cf0b8a778a384de2d7"}}}}, {0x4e8, 0x1, @m_police={0x4e4, 0x13, {{0xc, 0x1, 'police\x00'}, {0x408, 0x2, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x7, 0x2, 0x4, 0x2, 0x1dff, 0x5, 0x200, 0x3e, 0x7, 0xee, 0xffffffffffffff01, 0x8, 0x1000, 0x4, 0x2, 0xffffffffffffffbd, 0x0, 0xff, 0x3ff, 0x5, 0xffffffffffff9444, 0xfffffffffffff69d, 0x5, 0x40, 0x400, 0x556f, 0x2, 0x1, 0x7040, 0x9, 0x60, 0x4, 0x9, 0x7, 0xa830, 0xbcc, 0x10000, 0x4, 0x0, 0x5, 0x6, 0x9, 0x4, 0x2, 0x1000, 0x8, 0x1, 0x0, 0x4, 0x5, 0x1, 0x5, 0x7, 0x1, 0xba9, 0x9, 0x0, 0x7, 0x3ff, 0x7, 0x8, 0x7, 0x2, 0xfffffffffffff440, 0x1ff, 0x7, 0x7, 0x0, 0x100000000, 0x7, 0xfffffffffffffffc, 0x400, 0x20, 0x7a6747f5, 0xc516, 0x4, 0x92, 0x9, 0xc1e, 0x7f, 0x10001, 0xb3, 0x7, 0x1f, 0x17, 0x6, 0x7fffffff, 0x2, 0x4, 0x80000001, 0xffffffff, 0x3ff, 0x0, 0x8, 0x3, 0x2f, 0xd2, 0x2, 0x2, 0x6, 0x7fff, 0x6, 0x3, 0x0, 0x3f, 0x5, 0x80000000, 0xfffffffffffffffa, 0x9, 0x8, 0x7, 0x2, 0xffffffffffff8001, 0xffffffffffffffc0, 0xfa1, 0xffffffffffffff77, 0xffffffffffffffe0, 0x1, 0x6, 0xffffffffffffffff, 0x7fff, 0x9, 0x9, 0x9, 0x7, 0x25, 0xd2, 0x200000000000000, 0x2, 0x437, 0x401, 0x1, 0x5, 0x200, 0x465, 0x35, 0x349, 0xa76, 0xfffffffffffffffa, 0xa6, 0x0, 0x4, 0x6, 0x1f, 0x44, 0x100, 0x0, 0x8, 0x8, 0x100000000, 0x504, 0x7fffffff, 0x1, 0x6, 0x10001, 0x80000001, 0x3, 0x1, 0x7ff, 0x862, 0x9, 0xffffffff, 0xfffffffffffff001, 0x8, 0xe66d, 0x3, 0x8, 0x7f, 0x9, 0x6, 0x4, 0x2, 0x4, 0xef, 0x1, 0xa884, 0x43c46862, 0x8, 0x4, 0x10001, 0x9, 0x79b2, 0x1, 0x0, 0x8001, 0x0, 0x1, 0x7b, 0x1ec, 0xc37, 0x6, 0x3, 0x4, 0x0, 0x1, 0x7, 0x2, 0x1, 0x2, 0x3f, 0x4, 0x8, 0x2, 0x100, 0x4, 0x2, 0x5, 0x1, 0xffffffffffffff1f, 0x1, 0x3ff, 0x3, 0x7, 0xffffffffffffff01, 0xffff, 0xbc4b, 0x3, 0x0, 0x7, 0x965, 0x8001, 0x67, 0x4, 0xd7e, 0x1000, 0x1ff, 0x10000, 0x6, 0x9, 0x8, 0x4838ee66, 0x0, 0xfffffffffffff296, 0x7, 0x1, 0x8, 0x7f, 0x3ff, 0x3f, 0x4, 0x8, 0x8, 0x40, 0x401, 0x3, 0x1, 0x401, 0x1, 0x0, 0x7fff, 0xfffffffffffffffd, 0x0, 0x8000, 0x2, 0x5, 0x3f]}]}, {0xc8, 0x6, "28fafa087a5eacf1c3cffc3ba2eaa39b76c0c73f9b690269c628be5ef53232606cc708f3f150e5b9d58773b311d5bce5fa2be42b4ed6823c77418ca3529270871b61cd49699784c185cbabbc4eecb4abaf9fe1688df7a4cf6f78af13d4d5bf292f4026c74784cd881d3cf96927ce1c7518754e9f2562eab18a3d96bb5a334e586cfcb1c92d8018e8b1afad8338176a0a8dd5e20cb6d112126e750ee77be08e8c59cabe60ae5269bafe7dcaa0f1fbf610024bb5ac7385810b820527811466a220a716"}}}}]}, 0x5a8}, 0x1, 0x0, 0x0, 0x40000}, 0x4) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) 21:31:33 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x19, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:33 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x4c000000}) [ 727.367699] hfs: unable to parse mount options 21:31:33 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0xa000000}) 21:31:33 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x101200, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:33 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0xc, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:33 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x4020940d, &(0x7f0000000240)={0x302, 0x1000001}) 21:31:33 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) write(r0, &(0x7f0000000000)="d10fbb73fa00fc78e024a9dee7345a03518aa3c9e20ad325906e5798dde295b710b8fff068bb1763bcd4f710c36a6e3afce44ca5b96a87381ae2f240e5fac351089e7a7561bf7fe98453cbf9bae6d09e0e9491c7f2f7e923eefd39382ba73d", 0x5f) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) [ 727.504893] hfs: unable to parse mount options [ 727.516545] usb usb9: usbfs: process 15987 (syz-executor4) did not claim interface 0 before use [ 727.542673] usb usb9: usbfs: process 15990 (syz-executor1) did not claim interface 0 before use [ 727.591261] hfs: unable to parse mount options 21:31:33 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x600}) [ 727.665786] hfs: unable to parse mount options 21:31:33 executing program 6: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)="dc385ebc632f7379732f6e65742f697076342f76732f73796e635f7468726573686f6c6400", 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r2, 0x80080) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 21:31:33 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x1c, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:33 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x5000000}) [ 727.732569] usb usb9: usbfs: process 16016 (syz-executor4) did not claim interface 0 before use [ 727.753003] hfs: unable to parse mount options 21:31:33 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)={0x0, 0x3}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{0x8, 0x6}, {0x4, 0x9}, {0x8, 0x100000000}, {0xc, 0x20}, {0x3, 0x2}, {0x8}], 0x6) 21:31:33 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000800)={{{@in=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) ioprio_get$uid(0xa7f183355ace2612, r2) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r4) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r7, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r6, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000900)=ANY=[@ANYBLOB="290600040000000000000000000000000000ffffac141413ff010000000000000000000000000001fe8000000000000000000000000000bbda58dd7700430cafa97b9c7b4e4da3be7c0ccede45b01c28439b0508c25af04b4bf2d3016eab58f3981bbf97267609518e224438a5ca802c16eabe0eca81ee2e264a03555d1e28275a93c474c8cac14fd1e276a8e09640fb03fc1ac2ad363c7bde43909aa0b1bb8e2178bf9c97f85e8118794d00b4279a5248ef7a6fda5d0de2a83e24cba6ad566a99a5edeb6a0d71ce7c8d54dc7a327f"], 0x38) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:33 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x4008550c, &(0x7f0000000240)={0x302, 0x1000001}) [ 727.809376] usb usb9: usbfs: process 16020 (syz-executor1) did not claim interface 0 before use [ 727.817165] hfs: unable to parse mount options 21:31:34 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x7a00}) [ 727.911775] hfs: unable to parse mount options 21:31:34 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x14, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:34 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x48000000}) 21:31:34 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) socketpair$inet6(0xa, 0x3, 0x1, &(0x7f0000000000)) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000040)=0x880, 0x4) 21:31:34 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x25, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 728.023939] usb usb9: usbfs: process 16047 (syz-executor4) did not claim interface 0 before use 21:31:34 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r2, 0x80080) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000100)={0x4, 0x7, 0x3, 0xec7, 0x50ef}) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 21:31:34 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0xc4, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) [ 728.102652] hfs: unable to parse mount options [ 728.146211] usb usb9: usbfs: process 16060 (syz-executor1) did not claim interface 0 before use 21:31:34 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x48}) [ 728.201685] hfs: unable to parse mount options [ 728.204194] hfs: unable to parse mount options 21:31:34 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x10000300) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) 21:31:34 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x35, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:34 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x600}) [ 728.322543] EXT4-fs warning (device sda1): verify_group_input:104: Cannot add at group 4 (only 16 groups) [ 728.342092] usb usb9: usbfs: process 16082 (syz-executor4) did not claim interface 0 before use [ 728.346262] hfs: unable to parse mount options 21:31:34 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f00000027c0)=[{&(0x7f00000002c0)="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", 0x1fe, 0x2}], 0x8000, &(0x7f0000000280)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0xfffffffffffffee8, 0x20000000003e5, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) r6 = openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) ioctl$KDSKBSENT(r6, 0x4b49, &(0x7f0000001800)="a2e860212bced4c4448ebcbd91d5890e43c994c453bca5ed010438d2c13b71a205fcc8b32293d1aa3172d0166fb0816eccc7da08fe442346a918fbff3db32e734b6e5ca6039785b85820340c8be2b26c26bc4e134b203c7714eb8f260a6bbcea76881edc407ce1376fba9e74e5c36287a60f956f78ab72d6a2451acd5577ac4504393f55059f98ea962a62dba2e0840905ab58efde6cd21b3847d31de21d7d403db3da68324ee0cf547618800592415df7edbab433d21fff3f7e5bf692ed60203686a47907bb909275c2cbbbc4fdaa5fc5554418428a44b40e9399aaa30498f119ecfbe003b748b7286cde9b151c5ebe6fcafe5a0cad5fccc0dd0721a4e305c63374db667c3c912c6511b1fbd3ba61b51bf9a27184c3035ddaee8fc0bff2bc70152c6b0ac33900de18e3bb793b27f0f21605d0a20c000bd2ed3d227a910c2bd0bb6f855714cd2369f6c5413f9b42bbf0ce3bbaa798d799f363b013cc274a7ad8e2300ddc369059e2429417a611c879876c65b7442643d23f5598e1f807aa372b51685e6751ef54536de2411eca6f39597c41b41e98963a399c51b98353617d1c02632d70692b6d8642d29a1c0d5c8c589e4a9582a75719877daae1b126f27dab6a69bc364287af9931bfe02ea77470fa2c34de2c98f560fe5bfcb367d78bf05ff6801ea51cc5b30941aa6dc0a8d701395d0a8aef8d131f0814bc77782a8586fc9020afb9ca788baaf2bc560da9e3db69017a4d832283bfb3f4410d33cc86b9e60e331e27764ff3d3b7e253cf42d237daf7d474b6153c5f5fd094fcc91fba36d7423108b5311432dc1f280beb8b85c13274e69bf0fed60c705f0f9a241ea1e85ed92e5de5766d9bdd821f6ea5a2b159bda277f46199db7d5ae67b67d9e2836b7f843519d9d8f8ed03b126af51a9891904f22c705dac7536fd6c68e27fd1f8e384c8d8e7b8b51d4e9259d05d456506cda3d850777891a5a38171d2f9a487ca4703e0bc26d5ff898e89411b1fc675887924baffd835e2b55e51df4b8c35a553ba74336b89e3cb31e0f729bed756485b95f60b4e70fc12eee0eb5115c84fde26183eec3773bd3d6de2747f2c3d7c0a6be27eea4bd5e28ce977cb284eb2e9fa090311efa5f4553eb2163476c0fcd23176e57e3c534b60b2ba040266508cf7d3dbc451c6f2b5776e5ef488ccae2f11e57e78a5a2408b156290e1f2b92649b0cf904bf5a7504c182c90037182110a6dde7f5604577ba0e2a87acb76cc11e02e975f226ee90d81b89a99ba963ea2f4a200d375818454d725d9e3cbda41d3a1405dd459d4737783852acfde2dc2ada87dc18de9b1c0828080904f11b2436d9d858fe0dfb0d4e52dad09eb87e61689790a6c0151b36898014d18d2c8e32223142670adb3cb8c19672a253609cb33216a57a4dead36b6e889227a066a7c48e3412bb8c677975938bfd9277f7522beeb32d6ac6b7eb68882ba1a1457f4601f60de646f88174de8a781176a3b83a98a087c595e6a042f45ced18d4a9fb171302928d45e22d6dcfe5af9682565c446add41034cfd415215c50e1428a8e660944432759976c7a09c651fa558dee3ad3ae1033f293abf94c6ff4d36f9bec43f8b29045d7f39866653875a316319c4d82581fe12200cf3919435ec497f5f9f88a2a3a6b145d36abb7b38d0a093a0bc0ea024dbf2cc61f07cebb0e68825b36403e3c5dd2c61faaebc2e01d67f6ed2b2d94d2b1134037e99d8127c847c68886456e617d625b8dd880d6e88272d94605d5790ad174bdb089b1a6f8fd77139f5b33753416a03b508863750e9da13f3fc898c44da628a731866a4fe8d1b1507fcb01e6f5b790b9a0f36f5f73af57baa3a2e0367c3e2753ede9acd24dc0dc63ccc88d63f5163d22ad18df389bcfb29dbe2a96db300880712ff318e12a6e560c560651155c7624ef5be7130258d00d1fb06d02e63581c031c57aea65549b34863f05b9622261f92efc97bce9f2634a1122b120b9b8af62764dd916a2b884d656d1369fb3d2e517b4fec420000bf9d532f5ea81c5395a4c5192d5dc4df73ea26d991bfe7a114cfd8fbc1114af1e082795125fa8c34f47cab14676af423e80ff1070b9a1f9a5b2e0ab9f5957878fa981e160421c83115620622f025a052bc0a74cbd12e0164dab11d2920a5e241e7c83a1e37d88f623dc9462c8393a23f88e1d318e517bdb32eb2cb88710363e35157eba3c07b117706ec1fcbaf2a7d7f774fd708c6c86025991659700a1b539ebb4ea029ad694c1845f6de2005a4e952124f12ca429a7debe72333837a78b7219e9487e8ccc290f018e4cd05ad99e9c8413eb2276a4ce224714e530b9dcc8d20cd5b29ec2c3af436b9fbb589901c702b7c4f194b0d32351e3e183c09924b615fcb2ecfcbb957d4d88e31ae68913e67d50ec3c60c05bf3c60960b4e3bd0ddea29ff194305bd3eead8a453f913ab65e84a3f277c28156575b53941ebe49acdbe7b8e29731adbe3bfa1986d5e07ad9729be5534077db59cd47be7c6a7d99daba0d9235c9e1577dfde3630cd8d7f29ad91a3386feded824bcc553f5a3b30cb3fc1b4060850b5dbce54d8d452b63a125915e077cdc074181751295d3ca4fd53bc88f5a694e447661e690d3ce4f1621b147ad3662c88a5dcd4bc8d7249abd6b63cf5d33c36431f53cedf585e71964bea1f67343cb3ac74a8db21ec79147ecc4c939124bdbcd8fc456db4b616e67d21a65af1593e9397f675026a55aa9c16870793a62d16a62afbf46af535a6352b3b4b105e08453be43020dabd9c3acd275cd9d153e4d5e0beccec3422948ca91795da873333dd378d4361536110e84733c29f7a051e8ed039973a20f0f0ab60b6c98604e946b8f3869674c710edf303bd3a59bd97e95bb8635615d1e06a20acefd537528b24c35a262fd56f80e30619c95e90749f8225a1b113d81e70c0c1da6e929bbf63a9c3f70f5c4feb58bff6df0cbbdf9ac2108885e3c495e058768b536fa522f40f45001b50c575678333ce5a1e12080d66529b904ab08e6c46fa56b8663f7a587c8eb51f4f382701820e0b19fa175f4df2b89c28676cefba5238c898e02df6ba13186494c59fb4b5934dcc6066874cf9f9aca7eebd455fb11ab04c88bc1c2be0f5c87c29606d966256ec58d9b895a3f241fcaccd24a0f2b1dad670f7d2d4f6c399a51388081919ce6893d2dfa4b56257a7f09ef723b97e558a1b0c9dc0c3ef0f95815d982b46d97f3f2f08e76a4904e754b46588bf4ffe499faf1f916c5e68b19296ad11b47915524276656ed8b0b3217c7a4e166fe36ec04825370f3d64b488bedea991d9d6794dc3ba02adbef9505a3ae1c33701eb300f9ce12d44e6ba43095917449ff3a9517a6c304d333cfd40c3dd32919e30d8a543adc4015bd937cfa9a0aec2898ddd0c4ab1764491e9316f3c0c728715c51af68bda6650c1541c60653e6a866c9c7f8440e3af657d8633ea7fbfb9bd58ec2bae1dc2c022bdd281abb7cd5fd920849a1a1c4e8d09f86f625921c421febf48b43c75caa55dff15a2b51b368eb05941cd7c24ae43eaffc41f6887e85761ec745d86ce747f7a50015b1053b0e69436fd98bbe8ab34a71324c867952cbc2778941fa1cea4d5643422a56962ef99e059c8e01aabe5ca6c46fe463fcca668876bdea0ad47e6cf1f8cf4b337e65549b1db59c136cfd1206c7ac1ccdeb9973dbee33913f77a4e7f1ac977350e4990f3d559dd86a250ed8ff4ea7f4077dae2a4cfa7f6197b41d48cdd2d08645fdbf8a09cc7ce16482626b3ddcaaa69ac5f2bd650739d65eb7d0b7350b32484f0c2e5c079966215065f4bd1456d7d23a73275b6f06a31326fecc77f02c512b937e9b4bfd51e2e51933151912a40dfea8f120a68f023e102f65106a5357027d9cad5a079414de76fc5be73c5bf580664e0b7c3c2b717c63177de5d76ecdb1dbad98b905cec278c29031a1c40efe0d74e450a0058c5417c5d59d6a8f7bd633f40b95d5d98e587e62a8208ab0dbf2cd9d6a7bb5f9c6714facba1f57256c24f1be509c961c9e09f84f87f15dbb99ec432671aefe6e440d584d826c0daddce3d4eb0dc744ae4d5da2a028336a9576685027c2c52fe067c94a9cbd0420ffd215148e8020a719fb684210b6bbdb839ebb5ddcb85cc5636b6fcab2cd6805b6db31b3f6ef26b3dc5783a4a16b3af371e211fbc74df2bb4a9078b71a214933069262c17b02cf049ca46f41392accc1d04a24fb2637d052c565e15f6c39530f562ecf3789f843fc0cce28df0ed5da7d75b372ea19715d748379f1658edfba024c487036476da2f225a2f43874a826b8dc2e4730ef83a89455da5c8433a46c5ea3f0eb26283061269d98959eb9669a853a2e02cd598627d8f5c582e4c12a04cae08fcd4cf8ee1de4a1fe5a8d276e040396d46965e846ce210c3b664ed1bc6f3855619a01f52badbc67b1b4e7e40c0d20581f0e305a6460930626d69f9dbd1280c0d8b893a7bdf0bfcee504574c477b61c6c441f9778a4b862f90b9534ce53527cd7b6e07915a1eb16080210cde1eca7b0c7d884e81e2889a8eca8a14e4180f21e51d79854bace702f8a02d502240302233553a57c8f8b0fa519723d1d8ed47148fa21baa4124f75b5b91e1c2c3ef9cbf4d32d876d24fea00611408fe3ec6a592b281e5ba39269fb97c1de012b6f3d37816a3204371ba95fd612c45085e73749da9088072c46e1ff392a6bd419d66b9857148fde9ce195007b6a0d7a6cd1f7704d991317f6906e02f6c09a3f9e11c114126d510349b036b590f127bbda5a454db72638645128100d4f0ceb329df025d3347536e0fe545cbb349bcc979bc81769c9b2e52033bef3a3a225ea43948bd48c35cb2a555fd2273ea853f35b0126b9fa1ceeab5ff4a14216725398809da3e42f1c1b9bf94783f598cf66ed96e8f4b2c7858ef51745c492636e7ec6d2b3c1782a5974d6ea14711dbc86ac2eac90e266030f44869c8d7e89fcaf5bad9348794c9cbb34bfff7639de95ac6cb5c938f2cf4529a7fe6cf65f902c757e4b9a96978ba1775c47cad082ce1ea4af4d4fa340027da0a78649b4541bf32a2d16d7f332b3444e7cd04a7aa95c1e4587305297bf17610b3417f87e112155dd6de7fe67ba89cecb84b7c4af0c67b63a85d6f32d89b1e5e8a960c58a13df690fc044af065cb5d300ab99476c9ba1555ae4d52e6cd4c6101233379963f476c694bdf5a82df5606b0cb9dfbab8963c72fffa44365634d87285229fe9e441b0614e8e0cc5c1e166e357537509e4619362da28b8759c5497798525cbbb4c026fcc03eaa55bd7a9c6b8497671fabd8bcdc2c5dbe8c0ae84f98427d50e1165f38d1aaad6e193611898727f43642e153236fcf5aae0d2619bdbc964621529152814f4adbe7d73bb25aa800cf23cd67b1ee939191e2f99dc2799a9f35ee49c85af02eda8a7845f73b64225a2f44d02d94f63b11cac5a2466c7a3fc4e6027845cba1f01d763a36c81917b0c3438cb752d7cc127772dfdcbdac213b4f6d9e06b6719080f78189702525ac133401aad97d12373b58bd420ca963d96806398b2b58e5e8aea7fc6c8ff04c87d1d249211d48af904f2209238528a1575be042fd1d64b26a933438a39e2482758fadfe635d9aa2af741627639e720173f2e099fb7d631f47ed26fc55b4675c227cbeebc06ca1fa8bd9467d0824123ef13907b2e96a5b9a12f6ff8b01f7d5c73012f4f523a6df39d32257e9e21e2ba1b02a5512aa368df5758a9408e2b8e7645cae7e5005b6cbd0ab0e46b8") io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r7, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) r8 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x20, r8, 0x430, 0x70bd29, 0x25dfdbfe, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0xffffffff00000000}]}, 0x20}, 0x1, 0x0, 0x0, 0x84}, 0x20000080) r9 = semget$private(0x0, 0x2, 0x248) semctl$GETNCNT(r9, 0x3, 0xe, &(0x7f0000000700)=""/166) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:34 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x38, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 728.538296] hfs: unable to parse mount options [ 728.545590] EXT4-fs warning (device sda1): verify_group_input:104: Cannot add at group 4 (only 16 groups) 21:31:34 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x200000000000000}) 21:31:34 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x1000000, &(0x7f0000000100)={'trans=unix,', {[{@uname={'uname', 0x3d, '/dev/bus/usb/00#/00#\x00'}}, {@debug={'debug', 0x3d, 0xffffffffffff0001}}, {@access_any='access=any'}, {@cache_mmap='cache=mmap'}, {@access_client='access=client'}, {@noextend='noextend'}, {@afid={'afid', 0x3d, 0xfffffffffffff15f}}]}}) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)={0x0, 0x1, 0x2, 0x0, 0xd54}) [ 728.607806] usb usb9: usbfs: process 16105 (syz-executor1) did not claim interface 0 before use [ 728.633232] hfs: unable to parse mount options [ 728.645564] hfs: unable to parse mount options [ 728.708714] usb usb9: usbfs: process 16118 (syz-executor4) did not claim interface 0 before use 21:31:34 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x2, &(0x7f0000000240)={0x302, 0x1000001}) 21:31:34 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r2, 0x80080) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000100)={0x2, 0x4}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 21:31:34 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x18, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:34 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x9, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:34 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x2000000000000000}) 21:31:35 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) write$input_event(r1, &(0x7f0000000080)={{}, 0x3, 0x8, 0x2}, 0x18) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f0000000800)="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") ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:35 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x2000}) 21:31:35 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x4e22, 0xed, @dev={0xfe, 0x80, [], 0x14}, 0x1}, {0xa, 0x4e23, 0x6, @mcast1, 0x1000}, 0x610f, [0x5, 0x0, 0x10001, 0xf7, 0x3, 0x1d, 0x7fffffff, 0x3ff]}, 0x5c) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000080)=0x3ff800000000000, 0x4) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) getdents(r0, &(0x7f0000000100)=""/6, 0x6) [ 728.914627] hfs: unable to parse mount options [ 728.931896] hfs: unable to parse mount options [ 728.966377] usb usb9: usbfs: process 16148 (syz-executor1) did not claim interface 0 before use [ 728.977969] hfs: unable to parse mount options [ 729.013342] hfs: unable to parse mount options [ 729.048612] usb usb9: usbfs: process 16160 (syz-executor4) did not claim interface 0 before use 21:31:35 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x5452, &(0x7f0000000240)={0x302, 0x1000001}) 21:31:35 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3b, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:35 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x4}) 21:31:35 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x2c, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:35 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x2000000}) 21:31:35 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000040)={0x0, @speck128, 0x2, "01d79ebde7a3b5f1"}) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x4004550d, &(0x7f0000000240)) [ 729.218864] usb usb9: usbfs: process 16172 (syz-executor1) did not claim interface 0 before use [ 729.239623] hfs: unable to parse mount options [ 729.254491] hfs: unable to parse mount options 21:31:35 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x4004551e, &(0x7f0000000240)={0x302, 0x1000001}) [ 729.278928] usb usb9: usbfs: process 16184 (syz-executor4) did not claim interface 0 before use [ 729.317630] hfs: unable to parse mount options [ 729.327513] hfs: unable to parse mount options 21:31:35 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x7400000000000000}) 21:31:35 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000000900)=""/4096, 0x1000) getpeername$unix(r0, &(0x7f0000000100), &(0x7f00000001c0)=0x6e) ftruncate(r2, 0x80080) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) symlinkat(&(0x7f0000000200)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00') 21:31:35 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0xb, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:35 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x8, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:35 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0xffffff7f}) 21:31:35 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) connect$llc(r0, &(0x7f0000000080)={0x1a, 0x33f, 0x7, 0x8001, 0x2, 0x8001, @local}, 0x10) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000000), &(0x7f0000000040)=0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) [ 729.518642] usb usb9: usbfs: process 16203 (syz-executor1) did not claim interface 0 before use [ 729.542620] hfs: unable to parse mount options [ 729.562727] usb usb9: usbfs: process 16214 (syz-executor4) did not claim interface 0 before use [ 729.588995] hfs: unable to parse mount options [ 729.615984] hfs: unable to parse mount options [ 729.632367] hfs: unable to parse mount options 21:31:35 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x20000000}) 21:31:35 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185506, &(0x7f0000000240)={0x302, 0x1000001}) 21:31:35 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x7a}) 21:31:35 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) write$P9_RXATTRWALK(r0, &(0x7f0000000000)={0xf, 0x1f, 0x2, 0x3}, 0xf) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) 21:31:35 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0xa, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:35 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000080)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007c000/0x3000)=nil, 0x3000, 0xfffffffffffffbfe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:35 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x1b, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 729.847721] usb usb9: usbfs: process 16243 (syz-executor1) did not claim interface 0 before use [ 729.866860] usb usb9: usbfs: process 16248 (syz-executor4) did not claim interface 0 before use [ 729.874851] hfs: unable to parse mount options [ 729.881644] hfs: unable to parse mount options 21:31:36 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc00c5512, &(0x7f0000000240)={0x302, 0x1000001}) [ 729.920686] hfs: unable to parse mount options 21:31:36 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f00000002c0)={'nat\x00', 0x0, 0x3, 0xd1, [], 0x6, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], &(0x7f00000001c0)=""/209}, &(0x7f0000000340)=0x78) read(r2, &(0x7f0000001900)=""/4096, 0xdf4) ftruncate(r2, 0x80080) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) fgetxattr(r0, &(0x7f0000000a00)=@random={'osx.', '/proc/sys/net/ipv4/vs/sync_threshold\x00'}, &(0x7f0000000a40)=""/30, 0x1e) socketpair(0x11, 0x7, 0x0, &(0x7f0000000700)) io_setup(0x100000001, &(0x7f0000000380)=0x0) io_submit(r3, 0x6, &(0x7f00000009c0)=[&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x101, r2, &(0x7f00000003c0)="bddfd0cbf2d9832253c9311c4dfc5cd88c08ef83be1e7697c75833741eda253570c8093fac27edc2e80d286267af51e11ba7ffda0d25c23250a3f0f360ddf24fa0156687d5c5447f6d69eba1a6648acaf795af7d51ed34f68af4fdf99d0467d8f9c490201786ad1784ef48995bfed2734f6c9626e3c39a61b33ec03d3c44af6b0c84537e142fd91c14009c1a494608c3f20e520a6d098572a88ce5d1e4a99ae094e16eb4198fefe80c3a8786b0200ff1283a72c1317641adbfb2a098d15e421737876b2fe6ad7acfc2cda46b479c", 0xce, 0x3, 0x0, 0x3, r0}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x7, 0x3, r0, &(0x7f0000000500)="84e320302a1e071fdf37d861ae7326523723ae5506b703464b90a56f16905420e0cb4876d8c209212e3e05eff7825354baedb1331d98d69c4338f67b7975e641c8a048653776dde59d41da48d8a0a9703018afd2af9a1715be34ffbdcf01ce963a223cbec0d72496c4a72f010abed447a941361816e9f275c3d248a7f81fe13afb72d216dc55827dc79b1ef3bd517a7905a6529567f74120d3aed104acf217dd5ef07b1e622f7ed346e8aec036c2b547da9d16a1c5c975e7bd9d6e3fe0aed1055227b1442e037328610f953717aae1", 0xcf, 0x100, 0x0, 0x2, r1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x6, 0x4e, r2, &(0x7f0000000640)="01281021384cbc159f120b5b3b730f71097445c63126aa07c4ab6938f8be12a98204bbb7343edc27e71d49aa29b92f6b89232ad88477cad1978580e604b875a3a8421c61561e731070ec460e2640ca3065fee73ba583609f8161a669e2d14335e9f3ef649630251db93ff17d4034cad172af13002ee187f95a0db8dc8147", 0x7e, 0x7, 0x0, 0x3, r2}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000700), 0x0, 0x3, 0x0, 0x0, r0}, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x2, r0, &(0x7f0000000780)="7a5313cc14c7b79a3213338cc4544c077e6433b5bf9ed0996a74ec4c398b2e5765c52c8a4b974fbe73e05ba1d618d973622669ae5f5bb2f2bbc1bc0d67ab6717773a6225126a10815626b512bf487f27100229fad291ba43c8aacb1186c41a1f7443b9c59a12ba98400c57b80be9082734e63f39f7acb8a3bf7e6e33b9732cf629f66f526994dcfc4ac28a8dada15bb243b45e774b67484d8b6f0011c5f8d40679288444f79a77f1084a7d278d9d46d786b45c29a0e57c38e36bdfad374220bee879515647d847105d770c2b80e5d566375190dcff1110fe2811ecd1b830e0adc26aa9a3d481ea36cf94b8009b0f2ceb81b17d9b7d45867a85", 0xf9, 0x1, 0x0, 0x0, 0xffffffffffffff9c}, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x5, r2, &(0x7f0000000900)="482a9202e57bafdfcc596612f15bc623e242a0a0f17697c2675d11a4ed57f7607601a6fc44a1358ac4814529039af5f9146ed4f87f8bb5dd30ba57e0afcab925e01d1e8df88c0aab305404f8babeb2605c85007e485d01108d89b0598c48487a62f911595a8a6487a256dd7b9799babb0e795c988468fb20e005cf13a5", 0x7d, 0xb48, 0x0, 0x2, r2}]) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 21:31:36 executing program 0: syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) 21:31:36 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x4c}) [ 729.996288] hfs: unable to parse mount options 21:31:36 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x3}) 21:31:36 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0xa, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:36 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x2b, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:36 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000005c0)={0xffffffffffffffff}, 0x111, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000700)={0x16, 0x98, 0xfa00, {&(0x7f00000004c0), 0x2, r3, 0x10, 0x0, @ib={0x1b, 0xef87, 0x80000000, {"7025a90dd72caed79df64b6300076bea"}, 0x8, 0xff}}}, 0xa0) getresgid(&(0x7f0000000500), &(0x7f0000000540)=0x0, &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r5) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000800)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7fff}}, {@max_read={'max_read', 0x3d, 0x6}}, {@blksize={'blksize', 0x3d, 0x400}}, {@max_read={'max_read', 0x3d, 0x65d}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}]}}) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x87f) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r9, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r8, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:36 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000240)={0x302, 0x1000001}) [ 730.154111] usb usb9: usbfs: process 16283 (syz-executor1) did not claim interface 0 before use [ 730.163808] usb usb9: usbfs: process 16284 (syz-executor4) did not claim interface 0 before use [ 730.193955] hfs: unable to parse mount options 21:31:36 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000080), &(0x7f0000000140)=0x30) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000040)={0x3}, 0x4) ioctl$FS_IOC_FSGETXATTR(r1, 0x4004550d, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x1}) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000000100)=""/63) [ 730.233074] hfs: unable to parse mount options [ 730.244645] hfs: unable to parse mount options 21:31:36 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x60}) [ 730.310679] hfs: unable to parse mount options 21:31:36 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x6c}) 21:31:36 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x2e, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:36 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x27, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:36 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x80045503, &(0x7f0000000240)={0x302, 0x1000001}) 21:31:36 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x1ff) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) ioctl$TIOCSCTTY(r0, 0x540e, 0x6) write$P9_RVERSION(r0, &(0x7f00000002c0)=ANY=[], 0xfdcb) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x5}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000140)={r1, 0x1ff, 0x6, [0x5, 0xdd41, 0x8, 0x42, 0x9f6, 0x9]}, 0x14) ioctl$TIOCSTI(r0, 0x5412, 0x5) bind$bt_sco(r0, &(0x7f0000000080)={0x1f, {0x7fffffff, 0xa6, 0x0, 0x100, 0x5, 0x7fffffff}}, 0x8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000280)={@empty, 0x0}, &(0x7f00000001c0)=0x14) bind$bt_hci(r0, &(0x7f0000000200)={0x1f, r2, 0x3}, 0xc) 21:31:36 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000080)='em0keyring:\\ppp1#\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) r6 = openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r6, 0x40086610, &(0x7f00000000c0)=0x9) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r7, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 730.440446] usb usb9: usbfs: process 16313 (syz-executor1) did not claim interface 0 before use [ 730.478160] usb usb9: usbfs: process 16318 (syz-executor4) did not claim interface 0 before use 21:31:36 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000000900)=""/4096, 0x1000) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) ftruncate(r2, 0x80080) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) [ 730.548476] hfs: unable to parse mount options [ 730.575861] hfs: unable to parse mount options [ 730.609846] hfs: unable to parse mount options 21:31:36 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0xffffff7f00000000}) 21:31:36 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550c, &(0x7f0000000240)={0x302, 0x1000001}) [ 730.642649] hfs: unable to parse mount options 21:31:36 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x11, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:36 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x4800000000000000}) 21:31:36 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) sched_getattr(r1, &(0x7f0000000080), 0x30, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000100)={0x4, 0x2, 0x7, 0x100000000, 0x0}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={r2, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e24, @local}]}, &(0x7f0000000200)=0x10) 21:31:36 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x2a, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 730.788717] usb usb9: usbfs: process 16352 (syz-executor1) did not claim interface 0 before use 21:31:36 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000f80)='keyring\x00', &(0x7f0000000fc0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) keyctl$get_keyring_id(0x0, r2, 0x5) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r4) statfs(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)=""/127) keyctl$invalidate(0x15, r2) getrusage(0x1, &(0x7f0000000700)) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r3, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000c00)='msdos\x00', &(0x7f0000000c40)='./file0\x00', 0x2, 0x3, &(0x7f0000000e00)=[{&(0x7f0000000c80)="0eca6f14acfccd808f5935be330f46cefa0ec2c238ef8073c8c71eb7fc3b012af9b0883dce694408a0742f7b45fb83aeb74ee3232c", 0x35, 0x1}, {&(0x7f0000000cc0)="3acf954c0070da7fcf5f21476d7101e940b9fd15817a28c58d38db4fd1c13004c211f975d4432eab18708d47648b4250c27b9aea34f3917c72d5770db9405ff21f101f021f062cbf82cf13ddf8bf24b484a4486f3aa8c57d9e9e2a8bee67769fb866f005433629ef5bcd84811ab000eb503f58b17307d3b6dc9b990ffe7020e4a6d52cc97cb5449e8a9fe170f29b82e69115c11c222fc38d0602e45875a5bfbf96fe7d1c98b38a0d03523fbc75a3295ce7f1fa8430f8920da831a85f578c5747d75f97926369531e", 0xc8, 0xfffffffffffffffc}, {&(0x7f0000000dc0)="6abcee5683a4cfaaa21674797c7bb35eebb198d761", 0x15, 0x6}], 0x100000, &(0x7f0000000f00)={[{@nodots='nodots'}, {@dots='dots'}, {@fat=@uid={'uid', 0x3d, r6}}, {@fat=@umask={'umask', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r8, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r7, &(0x7f0000000140), 0x4000}]) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) r9 = getuid() quotactl(0xfffffffffffffffd, &(0x7f0000000080)='./file0\x00', r9, &(0x7f0000000800)="cb4262837a65fcdae07181c2d9669f54328bac0e51e39c6230c6eebf58ab57c44d8c4618f2941af7ef39c0df198bf664429ec3e8c729c9c4d2315eeb8d012080fc5e718114a833aaf539808863255ee9a888377b01199c79823a9c3b15f20a6595f0274c421e1563b96ac5fdc62b87c35c060d257620d0e9b393f32d4f0fca187987c2cb1eb638bc1db08126d861111d28ac30cbd1f02f10f20c87a1b2dde22f8d1dcd62") setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 730.849830] usb usb9: usbfs: process 16363 (syz-executor4) did not claim interface 0 before use [ 730.867675] hfs: unable to parse mount options 21:31:37 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0xffffff7f}) [ 730.906871] hfs: unable to parse mount options 21:31:37 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000100)=0x5, 0x4) read(r1, &(0x7f0000000900)=""/4096, 0x1000) pread64(r1, &(0x7f00000001c0)=""/190, 0xbe, 0x0) ftruncate(r2, 0x80080) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) [ 730.933655] hfs: unable to parse mount options [ 730.965796] hfs: unable to parse mount options 21:31:37 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x3000000}) 21:31:37 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000040)={0x18, 0x1, 0x0, {0x2}}, 0x18) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xffffffffffffffe1, 0x2001) ioctl$FS_IOC_FSGETXATTR(r1, 0x4004550d, &(0x7f0000000240)) 21:31:37 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x18, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:37 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x28, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 731.074495] usb usb9: usbfs: process 16390 (syz-executor4) did not claim interface 0 before use [ 731.096494] REISERFS warning (device loop5): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 731.096494] 21:31:37 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x48}) [ 731.212456] hfs: unable to parse mount options [ 731.248622] hfs: unable to parse mount options 21:31:37 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) openat$cgroup(r0, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000000)=0xd2, 0x4) 21:31:37 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x1000000}) [ 731.284610] hfs: unable to parse mount options [ 731.288220] usb usb9: usbfs: process 16414 (syz-executor1) did not claim interface 0 before use [ 731.311502] hfs: unable to parse mount options 21:31:37 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r2) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000080)=0x7, 0x4) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) getsockopt$IPT_SO_GET_REVISION_MATCH(r5, 0x0, 0x42, &(0x7f00000000c0)={'TPROXY\x00'}, &(0x7f0000000240)=0x1e) ioctl$VHOST_SET_VRING_NUM(r5, 0x4008af10, &(0x7f0000000280)={0x3, 0x6}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 731.430098] usb usb9: usbfs: process 16427 (syz-executor4) did not claim interface 0 before use 21:31:37 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x8008550e, &(0x7f0000000240)={0x302, 0x1000001}) 21:31:37 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x4000000}) 21:31:37 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x24, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:37 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x38, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:37 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x2, 0x800) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x4, 0x0, 0x6}}, 0x30) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x4004550d, &(0x7f0000000240)) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000)={0xfffffffffffffffa}, 0x4) 21:31:37 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x81}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r6, 0x4) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r7, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:37 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x5000000}) 21:31:37 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r2, 0x80080) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) [ 731.703731] usb usb9: usbfs: process 16455 (syz-executor1) did not claim interface 0 before use [ 731.709469] hfs: unable to parse mount options [ 731.733318] usb usb9: usbfs: process 16463 (syz-executor4) did not claim interface 0 before use [ 731.749714] hfs: unable to parse mount options 21:31:37 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x80000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x80000000000000}) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0xffffffffffffff00, 0x401) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2, 0x8000) 21:31:37 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x2000}) [ 731.791468] hfs: unable to parse mount options [ 731.803667] hfs: unable to parse mount options 21:31:38 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x8108551b, &(0x7f0000000240)={0x302, 0x1000001}) 21:31:38 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x68000000}) 21:31:38 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x1e, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:38 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r7, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r6, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) shutdown(r5, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:38 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0xf, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 731.975340] usb usb9: usbfs: process 16483 (syz-executor1) did not claim interface 0 before use [ 732.012662] usb usb9: usbfs: process 16491 (syz-executor4) did not claim interface 0 before use 21:31:38 executing program 6: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = dup(r1) r3 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r2, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r3, 0x80080) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) write$P9_RREADDIR(r0, &(0x7f00000001c0)={0xea, 0x29, 0x2, {0x7fff, [{{0x1, 0x2, 0x3}, 0x800, 0x400, 0x7, './file0'}, {{0x4, 0x4, 0x2}, 0x3, 0x100, 0xd, './file0/file0'}, {{0x36, 0x1, 0x5}, 0x3, 0x7f, 0x7, './file0'}, {{0x1, 0x0, 0x3}, 0x8, 0xfb, 0x7, './file0'}, {{0x83, 0x4, 0x1}, 0x1, 0x1, 0x7, './file0'}, {{0x64, 0x3, 0x1}, 0x7, 0x3ff, 0x7, './file0'}, {{0x22, 0x0, 0x5}, 0xffff, 0xcca6, 0x7, './file0'}]}}, 0xea) sendfile(r2, r3, &(0x7f0000d83ff8), 0x2008000fffffffe) 21:31:38 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000000)=0x1000, 0x4) socket$xdp(0x2c, 0x3, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) [ 732.068712] hfs: unable to parse mount options [ 732.119921] hfs: unable to parse mount options 21:31:38 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x550b, &(0x7f0000000240)={0x302, 0x1000001}) 21:31:38 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x300}) [ 732.148918] hfs: unable to parse mount options 21:31:38 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x48000000}) [ 732.226410] hfs: unable to parse mount options 21:31:38 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0xd, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:38 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x4c, &(0x7f0000000640)=[@in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e23, 0x7fffffff, @local, 0x3}, @in={0x2, 0x4e24, @rand_addr=0xfff}, @in={0x2, 0x4e21, @multicast1}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000800)={r5, 0xcd, "217c23a3e1900a08531e1367e3212ab180b024544c891aab1ec5393e10ce8479a7db027718799fb49674b0a7546e8e74fbf89367a64cdfc88a99d3d1b37142db4221101453e6f9477cbead0798679b95dbc2e0dfdbe0e3a1b67ee090dd8177dc55cbcfc661bebe83d8f5942bbc4c9bbb2c60f7383b78457b7e54aba0004d53fa4898a5e4ad38f859d959443394826b7e12c8361ac74119260560391ed952c3f689b0d9ce0feef2964ec3b747ddf7b3343fd9c62b26a44ac8a5c17cd8dd8d0bb16a34e02bbb6315ed3160d1ef41"}, &(0x7f00000004c0)=0xd5) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = semget(0x1, 0x2, 0x40) semctl$SEM_STAT(r7, 0x0, 0x12, &(0x7f0000000080)=""/44) close(r6) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r8, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r6, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000280)={{0xa, 0x4e20, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1, 0x80000}, 0xfffffffffffffffe, [0xb7, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd]}, 0x5c) [ 732.280144] usb usb9: usbfs: process 16525 (syz-executor1) did not claim interface 0 before use 21:31:38 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x8000000000000008, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x2, 0x3, 0x4, 0x8, 0x1f, 0x439548e0, 0x1, 0x6, 0x0}, &(0x7f0000000040)=0x20) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000080)={r1, 0x8}, 0x8) 21:31:38 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x1e, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 732.329627] usb usb9: usbfs: process 16529 (syz-executor4) did not claim interface 0 before use 21:31:38 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185504, &(0x7f0000000240)={0x302, 0x1000001}) [ 732.381632] hfs: unable to parse mount options 21:31:38 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x1000000}) [ 732.455970] hfs: unable to parse mount options [ 732.469916] hfs: unable to parse mount options 21:31:38 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x3f000000}) [ 732.518947] hfs: unable to parse mount options 21:31:38 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x20400, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x400001, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) ioctl(r0, 0x6, &(0x7f0000000100)="d20ecd302fc177a63e7fb1aaceb5e96859b0e8ae47f59bbc8f922496978fbf81be1c80176b206e57781e3f796e384ab516c7c1b3d7c55ba673066ad1d0b7ad659c9ebc85229c4308752b50d0b225f28e29add42e69e19d169fac7bcb64431bbf161df0fac7e214b69c6cb0ce1a2f25ccab365468c88aaf204c5d89a90e22548a43d2d72e07b084824aabc6e6") syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) 21:31:38 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3c, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:38 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x40085511, &(0x7f0000000240)={0x302, 0x1000001}) 21:31:38 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0xe, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 732.625018] usb usb9: usbfs: process 16564 (syz-executor4) did not claim interface 0 before use [ 732.634777] usb usb9: usbfs: process 16565 (syz-executor1) did not claim interface 0 before use [ 732.737989] hfs: unable to parse mount options 21:31:38 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000000900)=""/4096, 0x1317) ftruncate(r2, 0x80080) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 21:31:38 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007f000/0x1000)=nil, 0x1000, 0xfffffffffffffffe, 0x401f, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) epoll_wait(r1, &(0x7f0000000080)=[{}, {}, {}, {}, {}], 0x5, 0x5) 21:31:38 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x4c00000000000000}) 21:31:38 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x5450, &(0x7f0000000240)={0x302, 0x1000001}) 21:31:39 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x9, {{0xa, 0x4e21, 0x401, @mcast1, 0x1f}}}, 0x88) 21:31:39 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0xa000000}) [ 732.826720] hfs: unable to parse mount options [ 732.839191] usb usb9: usbfs: process 16591 (syz-executor1) did not claim interface 0 before use [ 732.859405] hfs: unable to parse mount options [ 732.915564] hfs: unable to parse mount options 21:31:39 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3b, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:39 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x9, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:39 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0182500, &(0x7f0000000240)={0x302, 0x1000001}) 21:31:39 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080), 0x10) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 733.017946] usb usb9: usbfs: process 16611 (syz-executor4) did not claim interface 0 before use 21:31:39 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x3f00000000000000}) 21:31:39 executing program 0: r0 = accept4(0xffffffffffffff9c, &(0x7f0000000100)=@l2, &(0x7f0000000080)=0x80, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f00000002c0)) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000300)=0x5) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000180)=""/178, &(0x7f0000000280)=0xb2) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x8000) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) ioctl$FS_IOC_FSGETXATTR(r1, 0x4004550d, &(0x7f0000000240)) getrlimit(0xf, &(0x7f0000000000)) 21:31:39 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x60}) [ 733.175090] hfs: unable to parse mount options [ 733.188693] hfs: unable to parse mount options [ 733.203390] usb usb9: usbfs: process 16628 (syz-executor1) did not claim interface 0 before use 21:31:39 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x363, 0x1000001}) 21:31:39 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x7, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 733.254395] usb usb9: usbfs: process 16628 (syz-executor1) did not claim interface 0 before use [ 733.286494] hfs: unable to parse mount options 21:31:39 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001b80)={0x0, @loopback, @rand_addr}, &(0x7f0000001bc0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000001c00)={'team0\x00', r6}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getownex(r7, 0x10, &(0x7f0000000140)={0x0, 0x0}) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x10000, 0x80000000, 0x100000000000000, 0x8001, 0x0, 0x4, 0x0, 0x0, 0x1f, 0x3, 0x6, 0x200, 0x6, 0x8aee, 0x0, 0x6, 0x7, 0xffffffff, 0x401, 0x1, 0x5, 0x58, 0xee000000, 0x3ff, 0x200, 0x800000000000, 0x1, 0x101, 0x1, 0x7, 0x0, 0x9fc, 0xfffffffffffffffc, 0x401, 0x80000000, 0x8, 0x0, 0x7, 0x2, @perf_config_ext={0xff, 0x86d}, 0x100, 0x2, 0x3, 0x3, 0x40, 0x53b3, 0xfff}, r9, 0x6, 0xffffffffffffffff, 0x0) close(r8) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r10, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r8, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 733.341873] usb usb9: usbfs: process 16646 (syz-executor4) did not claim interface 0 before use 21:31:39 executing program 6: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x500, 0x0) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = dup(r1) r3 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r2, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r3, 0x80080) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) alarm(0x4e) sendfile(r2, r3, &(0x7f0000d83ff8), 0x2008000fffffffe) 21:31:39 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000000)=""/88, &(0x7f0000000080)=0x58) 21:31:39 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x4, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:39 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x500000000000000}) 21:31:39 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x366, 0x1000001}) [ 733.470795] hfs: unable to parse mount options 21:31:39 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0xffffff7f00000000}) [ 733.525509] usb usb9: usbfs: process 16669 (syz-executor1) did not claim interface 0 before use [ 733.529588] hfs: unable to parse mount options [ 733.547401] hfs: unable to parse mount options [ 733.591833] hfs: unable to parse mount options 21:31:39 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={0x0, 0x4}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000001300)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000000140)=0x1008) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) 21:31:39 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x2e, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 733.622211] usb usb9: usbfs: process 16669 (syz-executor1) did not claim interface 0 before use 21:31:39 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) r6 = openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) madvise(&(0x7f000007e000/0x3000)=nil, 0x3000, 0x13) io_setup(0x8, &(0x7f0000000100)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000800)={{{@in6, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000080)=0xe8) io_submit(r7, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r6, 0x84, 0x1b, &(0x7f00000000c0)={0x0, 0x7, "29284e796b5290"}, &(0x7f0000000140)=0xf) setsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000280)={r8, 0x7fff}, 0x8) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:39 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x303, 0x1000001}) [ 733.680971] usb usb9: usbfs: process 16686 (syz-executor4) did not claim interface 0 before use 21:31:39 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x3000000}) 21:31:39 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x8, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 733.798411] hfs: unable to parse mount options [ 733.855651] hfs: unable to parse mount options 21:31:40 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x6c000000}) 21:31:40 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) write$P9_RSTAT(r0, &(0x7f0000000000)={0x7c, 0x7d, 0x1, {0x0, 0x75, 0x3, 0x0, {0x0, 0x3, 0x8}, 0x2000000, 0xb2, 0x3, 0xa7a2, 0x15, '/dev/bus/usb/00#/00#\x00', 0x15, '/dev/bus/usb/00#/00#\x00', 0x3, 'em1', 0x15, '/dev/bus/usb/00#/00#\x00'}}, 0x7c) [ 733.886315] usb usb9: usbfs: process 16708 (syz-executor1) did not claim interface 0 before use [ 733.929111] hfs: unable to parse mount options 21:31:40 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x1b, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:40 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x309, 0x1000001}) [ 733.960843] usb usb9: usbfs: process 16719 (syz-executor4) did not claim interface 0 before use [ 733.965464] hfs: unable to parse mount options [ 734.095633] hfs: unable to parse mount options [ 734.168778] hfs: unable to parse mount options 21:31:40 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r2, 0x80080) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 21:31:40 executing program 5: r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x20200) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000700)={0x4, 0x0, [{0x2, 0x9, 0x2, 0x0, 0x100, 0x4, 0x2eb}, {0x80000007, 0x101, 0x2, 0x2, 0x6, 0x1, 0x4}, {0x0, 0x3, 0x4, 0xc18, 0x2, 0x9, 0x400}, {0x80000007, 0x0, 0x5, 0x4, 0x3, 0x3ff, 0x3}]}) r1 = socket$inet6(0xa, 0x40000005, 0x38) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r2, 0x400454ce, r4) recvfrom$inet6(r2, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000140)={0x18}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r2, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000800)=@raw={'raw\x00', 0x9, 0x3, 0x328, 0x0, 0x0, 0x0, 0x168, 0x0, 0x258, 0x258, 0x258, 0x258, 0x258, 0x3, &(0x7f0000000080), {[{{@ipv6={@dev={0xfe, 0x80, [], 0x10}, @loopback, [0xffffffff, 0xff000000, 0x0, 0xff000000], [0xffffff00, 0x0, 0xff0000ff], 'gre0\x00', 'ip_vti0\x00', {}, {}, 0x0, 0x8, 0x4, 0x30}, 0x0, 0x120, 0x168, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}, @common=@frag={0x30, 'frag\x00', 0x0, {0x6, 0x8, 0x2, 0x0, 0x1}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@remote, 'bond0\x00', 0x81}}}, {{@ipv6={@empty, @mcast1, [0xff000000, 0xff, 0xff, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffff00], 'veth0_to_team\x00', 'erspan0\x00', {0xff}, {}, 0x0, 0x9, 0x3, 0x49}, 0x0, 0xc8, 0xf0}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x7, 0x6, 0x3}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x388) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r7, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r6, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:40 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)=0x0) kcmp(r1, r2, 0x7, r0, r0) 21:31:40 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x5}) 21:31:40 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x2a, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:40 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x3a1, 0x1000001}) 21:31:40 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x5}) [ 734.252283] hfs: unable to parse mount options [ 734.264539] usb usb9: usbfs: process 16749 (syz-executor1) did not claim interface 0 before use 21:31:40 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x30, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 734.302136] usb usb9: usbfs: process 16755 (syz-executor4) did not claim interface 0 before use [ 734.321693] hfs: unable to parse mount options 21:31:40 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0xa00}) [ 734.352344] usb usb9: usbfs: process 16760 (syz-executor7) did not claim interface 1 before use 21:31:40 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x39, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:40 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) 21:31:40 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000002}) 21:31:40 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540)=0x0, &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r4) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) fstat(r6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={r7, r8, r3}, 0xc) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r9, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r6, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 734.474600] usb usb9: usbfs: process 16770 (syz-executor1) did not claim interface 0 before use [ 734.510653] hfs: unable to parse mount options 21:31:40 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x3f00000000000000}) 21:31:40 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0xa}) [ 734.606709] hfs: unable to parse mount options [ 734.613972] hfs: unable to parse mount options 21:31:40 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000180)=0x125) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000280)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000000080)=0x1008) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x80) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f00000001c0)) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)={0x0, 0x20}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000001380)={@generic={0x1, "93edff3ee7345743fb706b36d670a8d20570ceee806d8756f535c5ba85a1c7888ee0bce97b9d57f1b2a7a09d41f2afac62bed31faa3803d44cf7994b25430fed6bb905432d9df9557ae23a5066e2843411c305171b025da4c0f17131bf5e797065e6d399b91b69c3ba0e092a11e927e8649de51b732436ffe83f58ce5ede"}, {&(0x7f00000012c0)=""/149, 0x95}, &(0x7f0000000100), 0x10}, 0xa0) [ 734.678473] hfs: unable to parse mount options [ 734.690077] usb usb9: usbfs: process 16797 (syz-executor4) did not claim interface 0 before use [ 734.756148] usb usb9: usbfs: process 16803 (syz-executor1) did not claim interface 0 before use 21:31:41 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x100038a}) 21:31:41 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x2f, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:41 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x33, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:41 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f00000002c0), &(0x7f00000004c0)=0x4) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000140)={r7, 0xc894, 0x4}, &(0x7f0000000280)=0x8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:41 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x6c00000000000000}) 21:31:41 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = dup(r0) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r2, 0x80080) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) write$evdev(r2, &(0x7f00000002c0)=[{{r3, r4/1000+30000}, 0x17, 0x4, 0x1}, {{0x0, 0x7530}, 0x402, 0x5, 0x7}, {{}, 0x16, 0xa1}, {{0x0, 0x7530}, 0x2, 0xa0}, {{r5, r6/1000+10000}, 0x16, 0x682db5db, 0x8000}, {{0x77359400}, 0x17, 0x59a, 0x4}, {{r7, r8/1000+30000}, 0x1f, 0x5, 0x5}, {{0x0, 0x2710}, 0x11, 0x0, 0xffffffffffffff00}, {{0x0, 0x2710}, 0x16, 0xff, 0xf5}], 0xd8) renameat2(r0, &(0x7f0000000140)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00', 0x6) ioctl$EXT4_IOC_RESIZE_FS(r1, 0x40086610, &(0x7f0000000100)=0x4) sendfile(r1, r2, &(0x7f0000d83ff8), 0x553) 21:31:41 executing program 0: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x3) getcwd(&(0x7f0000000100)=""/4096, 0x1000) r1 = syz_open_dev$usb(&(0x7f0000007500)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x4004550d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7f}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000012c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000013c0)=0x0) r4 = gettid() getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000040c0)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f00000041c0)=0xe8) sendmsg$netlink(r1, &(0x7f00000074c0)={&(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000007400)=[{&(0x7f0000001100)={0x184, 0x19, 0xb18, 0x70bd27, 0x25dfdbfd, "", [@generic, @typed={0xc, 0xe, @u64=0x2}, @generic="8f94ba04f3e28c8544b9bebac8a42cfaa68116146a61230d005e45f9b9e12634d05a72a47e24bc9f4196ec7ee772780e7f0edf716e45418f109277b1db9c42192d812282e0588c86f4f6347261c54ca77a483b283d9e1b8e1b4e1fe4c6c4", @nested={0x108, 0x82, [@typed={0x8, 0x82, @fd=r1}, @typed={0xc, 0xf, @u64=0x1b1e}, @typed={0xf0, 0x7a, @binary="b69fe63e08b9c1f373d3647cf9bda99d182f15499090a0ff6b716f8ee9d5bec9e7381c2149d71d246f8f93b2d147d297eef7b04c72319a68711b5395cd1d7941f160fb19169a5f4814d7f04934c0b1e7edfa2c56d3c70ea87c3bd77e0053ed9eb2aa5f1de4ef3ee143ddaf26ddaed60f0c35cbebd02179c224e8448e4a0cec283a9fe2b8d6b36d2786ae906eaa68d2ddfc845ad715d763049ab47c0f8c4cede9b99a0e195a04ed093c9667f17acb36bae3149beac5df2173bd7564732d5c24f2ad5e06f51a695c8a335d396b4e1ae2f67259951d90a3eab471feae47ed938c1d0e64334cfab63efeb6f93ab5"}]}]}, 0x184}, {&(0x7f0000001400)={0x253c, 0x21, 0x2, 0x70bd28, 0x25dfdbfd, "", [@typed={0x1c, 0x2c, @str='/dev/bus/usb/00#/00#\x00'}, @generic="d9b6e9b10b80aeb5333173ed508112302acfe9fe4fbc9262a05485e403e6274f8078bb9a36e4b8b3611be74c5a70f336d0fa9bff62b92829c5a408369861a1867086cdce", @typed={0x8, 0x37, @ipv4=@multicast1}, @nested={0x1264, 0x82, [@generic="40f2d180eae6626ab79d18f97a36475ea079406dc4c72529ebe4fa50df17a6709685b8895ee0097c85a209cc167fe88faf1ac24552d13ebf653f5e50ce07c5fe7e4baab8e47e80d4b70454a48a0859800317312531f89fb2aad413df89a66485ae24607e15e9beb007d89dbf1686", @generic="b9ff1fd221bb474bd885d7f08a681d5528e3", @generic="daf7c31336530351783b892795599bb826fd9c139aeea34dd99f459ff3a71ebc27afb33b7ab1f530e45addbec439e3f44405ff2a65747ad7f27c264df5ab1ece68c1aef6195fc72ae9022fbc1ccc8bddb2e5da1d444122514b6179d67b4fe19e96ea494f70c70f04acc1f88cd474ebed7f8b782a7a254aeb429d1aafe359e543140af7d67ba9c324d49b8b656161139cb8a93d4f8b0faac7a978f909ea5cc1599442a22dd65a4bf82e41d0df9a8f79a715c92d6c8f04", @generic="af9d5897fe1dd0d292ac03f108afecebb53c5f8f87670b5c2eabc7108a6f76d87bf9c53c1a6ac043ab9ed20fb3c1427d18f3d6ab0e0e84942782e4d5211aee9c67281753b39be2ae0735359220e509e56d0a5e657ae4cd31a52d7ef64beeed16585dfde40abd0fe682228ec0f8f4996743fbd0d350e0890a4192aaaed44613c18845912fc3e72ae2d7911d39c9a8c6d2a8bb2403efe5d4fb8f791a87f2ca83a632261b12936378e74dceed244f019315c9d1409cabf09c5b9df3997f5404f099305df4d0ad2ad49e8b0c26dfad56bed8931f2ddf0e29cf4264c689381bfd4909d781b3b4e1d9cf37ee8ef502ed2b921303e9ec40ba575d58f6fccb569bff532fc7a271650a164776a22b23a131b606e6022785cd4c2a5109df261eabf492735b2ca70edf796ec97513ccc4c08ac1b6d579f43a3300e28fe92e909922eecb68b2139eab5f09ef170019ca8cb1eba0027e4b82ea5da685daa1134793866027ab0764b8b4164af964a2e8a982228153486e19708e2216035dc19057366d4a9f591e16685b4ee83a9f3a121a2f69c55ad7d7d44144b101e4a3722eb017f4295410e327d19fa1dfa5c0ccbea2af6e8a4343be2f5abc74ad4b8976836168dcc79cdb325b69c5e8bb67174b0ed86d4a7485e94b77ee222db4a26eda9eb5719b5985483bffe015d8fedd9190f15ae0e90046e74b39949d7f40bf8bb4110cd336253e76f38cda643c2259ed47a1456d9365a0ac15285376e550f896d2eecca548eb1cf9a301b10adeb2903f5c00b5a1c86e19660ee691086ff3162673b26258d46b516a2fce82de97f55a76d28c5b66f46ee7faa982f3383bd9b104e02d865991aa58f3b11ba419e97a76576c4e17399b364d136144c3483c7d5555934dafba0c92f82bc368dfada98cd74609606267e92f8c1c7111ed136a5c6dcfc7bcf6ef5083b3f73effeb95f84ce492aba7634238da33397dee86371985acd665f93d99fa5c785a9b1b2d3fc732bd320c98122261d061041f2e2b3c15c9457259ddb886419188477190091de515df85456cbbee3a442057f1f624e404bed3d8200a0be2d3b383ec1a7254a630e3b9a6d982fe312238b8533fc4cd77102cbeb48a3a3ac5c297563adc731c24240f259621df15ab539faaf48cc32e91190882d3a32389eebdc6b7233e909a46ea49c24d1401a86545fffd646e18bac399ee52b26dcf57b102f4c217c14cf45842512028a60c51288b48b03ef6d9a1716513cc8036926cc32e2ea9a83f0852a3c1aa47cb6960127044ce48cda4b7a213ad8b1cc07599fa8556b5983f300fbd4c1d5a746de99149a8dbf1853143c1ea483b7d2786a6f33be9a360863a9d36a39d8212ea4fbf0e7c5f1a4ea5e7740caa4f55ca907ec263ce806c002a7f1a8889792450697f84730d214c9c685f1bb3d5ba1fcab851b3f684b0188f55047fc396c5c3a97e9f97c2b9796d16f6421c742ec9547c6c2f2a3aebdaf9bf14ebafa989b53278430ac263a8853a4881a1b1cb9549d8c77e0035d750b105d9e8e5f46cd80690f69912c4fe0373ef03ad025cd22e1a86a9d5775e20d5de8a8476f0f1487df6e5f2db9a54b33cea17a3a1d74014c2d9a93be7f31773b29a14a741533fa8e38024f6532980ec3435314795b88fd111c197d8d0ba7eccb9e6db9638789b279639080702ee4dd100eef33eaf42c22347f826cf5e559b70ebdb5233e4374de7dad4c3b2d493d4be2cd71ff074e77e617fe01bd7687e9c6ec989f11279684f53b954dc2c1199de24cbb8b0f91d9b91089bf4d69220303c7b635da5ff93a75f0748cd07045d64f91738bc8a4bc9d3f206fab04b7080e399d45bb4d6e570925e49b3f5fc11ae79c73c5c4cab5ac3341adae59f7f78ea9de77beaea16c28ff231bae97a5fb84cc46cf0c58bf52531d9dc1851dcc563cfba1cd0e0d62672f0c775b1795ffd3f50affa5d51f71743d7b5b5bfc08d23a3a766d58f78fe826dde7e4a5c39e7e9ced208d22c1e0639be9ccd176d39fd88a6caf64c0adbf1fbe96ad4492a17fb0a5a25e5bc2632fee5d9fba79156eb2f285bba6fbda48303e3b656708eb67c8a4946f70562ec9876230272da10ee5840e890320b2641815a06c999b3f0d005418a62a3d1dfafdf0d573adf1e1ff16666dff8ed8633d8aa216d48384dab4e55b84e4bff09c186243e4e2a31d6684950834b2e8a03573500dc1d1086670996a37cc336bf3ff2153476027bcce49e099808c08c8f71dd96bdc94cd5d9debca3540af0e8f86f11f59c36867e21aba5077408441809ffbaf1a0de1a4a29b19d72de15864302667cd64a4ded1db40c3ba37bcddc6a6f7ae9e5384bb72b2f875f3f75f20567ad69ca7e14b247040e8f49dfa611af68cf07df23de23df22a3903aef74caf322b98ef4507dcaf5a9ecc7a777449ea5e0d284069104bc825bc9edef0e4dd02203f60e23fa8f9aa7848d9685518f25c5313a0e781487ac1d6556b182f46f7d363bb9b3f85a76b3a29c81298501929c195b1c219d9895baa490b27b46b52b6f6ee1e73b5733c79e5f1c8afa71f2467b88ada09a79ad61767233627fbd421e143620c15ec2840c20cd91f704c88876be542bb55caebb9e26887ce31c38575d7535d1256e96a84e6dc269716be657982b9c101834eb745242361a2681b3eed57b0da17c0317f3ad2b29e31d1bb797222a8607279c3bd88b21335eaf1355ee9977de8be337b74632e4a57b5f4a6144dff46bf00495e4b4682a75d6f6404a325a05cafb2c3bf8a5aed44911fb80a98ccb3a2dc3dcd65fd527a43de570617920d641def68fcce258891b005a117fadaf9c7073c96acc9d9cf912088502d8f3be3879f4983a0c3b971bc16ab9336d1fbcf1f724013206bdd44c719c0d71cb539dfd9df73e41d947cf977b94a03744d131e553cb2951a4dfda37ab54b68c18b1ed7d90c27fb2028711238578e40e726d168306a5692be8a044de13ea6645e8d5cec90120f8fd940b8dc9f660689a030d9fbe3c6e2357584740cabbb5fbb71cb93b10e7769b19daba0fb3a16d67f18eca037220a997a5d43817cfca3baf4a27b25a14e56145471ab1704e8d9c00434e1ceef759036efcc0cd75107eba7e591beeb64ecfdc6360158a81eaefa997829c48be3b9f1ed3fbe62c9984c91e72c299f288a1527e302a58ada92314c2f2f2ac05f4eeb2ac4d7079b21aa3404630e270be22a2a2d72132344ab14f401617144bb899d0e8e1c39f1a2f19bbfae30e4a6d5c9487e519dd8f26563b9f411a89d41842973ba37dc9c2476a4c8c1ad75e8d27521e010757c137749f6f75de2fe24c116a401343c1fc8e2b170ebd41eace969166dd93ba415f1c244217f781af6c8fcae9686be35c3d199a2ca1486e8613e3e1b9390e2d1e555eaf8c0fde2ad740f6290e00b79894163693871c8526d4cfe6afd1e817a8406bf6685845389c5c33b413b02818691116a2f5d65096d70a801c7ba579642d2a29dc92691be2d2e82bea407386e1eadff5984c8addc3200ad018358b1d3a48409bd712dadac4aeac3c8e793015b22759a5cc653138ca56727205479b9e6bcc3d908428bfe4ff48bba67a44b59d170e93dcb717e9b3dcc4170d585e7d129f9ae40dff97c0deee040cdf8ef3f928ceb4a8f5b4effc7ddfdc278bea4d3918d91a990d95a4a0f4678d75e9dd3ad7ef8e75d0c28ed51098817e6332bb3fd0a3ba08dbfb09c9c332cf28fb1d3bb54d58d4b8bb7465d9f88f89948e2137e367e70662219e16606ac31ddd0ebd57b4129e8dda566ffa3e8ac4ba33e06459a7168c9079184719bda4aba1fe0ae34154c555efbd116c5396ac37592203a11b8ae17a2939610eaaae83a047f640a4842a1a63b6d250828224d233d698cea047a37c836d5786f9cf535c3e7e3188fb5ee239fd3ee4dfe66f102aa9a5005df76440d445fb136da1c07ed580c66757b5c0213693f76f3b3a51529dd063b9c715c168fa036cf471f3f24199d3a3865b99a9a01db9b2be6ee0f42c3044a70c76ce78817b9b7b4ce5d24e61991f92a2ce1938ef4227cb85680a8648bf4334aebe575a9b5d7992669703f6d9865fd89795787d73d9a08b9ccc7a1539e37e2db237458b984ad53dee964b9bbb1497d0a41d6239797aa38a842be4e581acf7ddf53b9be4aad314a6e49b8de499ad00a3e9162d76c3e82acf5276a67231cc62ed8bcda074a831590f311c2d9096ada4b8088e936b05f34c5d86777aa8d650cc0ecd0a24853d632991d428af320e33b15daed9c4c956a4331c016ebc8c576fe16453006faa30cb51a67f4fd54ec85563450134120b1468edae0c290f9697cf6c58d0e87331669b9ac0229918ccba6d80a34be4b15635efdbed4ce90a407d1e5df4ae5673cf35be5801f35945f3ce06f5f254490547a9962ec3d4f2b238809a63760514d461d48dadf40916ed33462cbf8cf054399b0f39758825434e1bdf8d6324efa4eed7fb86793a6fa9cb12d617d1823991c63985c01889e6e34a3a9739f474f72f08b0739254be2391c1898675148452de18d6bc99628976a62a62f5312f7e071bd16c4666a233aa4e807035639c8be8a90956c2000611caa58107892537394629c576d3ecf9af7f248ddb13996da91c8b61d898dcf003e74422edbcd3ede53d13326be0e235ad34498779310311e06e3642c37086bb0eb7eba36cfb00ae8549a2509ded8f92260f1ad3be1a37166298756c9d4bca516d11a51b3c9fee431971eb2c55d2b85c337446b95d9cbb9d8e7da9b5560832fc3ce0d9c9551d78acf5504cad451bee91413075b3300e0061cbcdbbd4f69767851d2f44673fd1168f78530616a29512a669fa19358fb4b330e97f894e8ef4b43837a84f9ef7421abfdef9080a47b5203b656fb932acd3b7cb96421068f7f29a5eda262d170949c9aac243a938b434352cc8217a9d03e9550ac6147f994446e6f13eff2564b953b4914ec22e34a1a0973ef4a715403d1c20f6db56a9633ff077777dda630a0f880a7762e4b8700bacac82d59f7528bc9bbd76d7fb6a89f6540ab28724dbbcb94694f09cad0fabeaf5c995ec2ae57c3a1a9fb9b714dc0e55913aec189d8ac3aa0ee645e46cbcfba901755b2695c0d82a70514bf2f235b482f906d55ea130d311cc7e20f18eec54e62159d87b8cb62892ab81bead2a6357c2ae099d9d6b400c4aff7a5831b341ec3a913228a8b7471022ac51b9db5d055c4b917100f3530459b2ae11a8de3ff258834c4cb62b90ed426dfe380c1328fe4fb3dee3e3105821f2b246372ed0ab17723c85a08e67f013605d3608559b177c4548eea9be510c6f957d904d79f96b025795cbc02061e8ca373ad12537cbe08868b962b92125d8f250d8771095ee0b5f5ad6d144359a0e9cec90849d8fca41fd8f2ca50e36f97cc9d81dedca3b7df3ccd7d05df73d5dd5a44bf21ce21fd946b6656debfbdb5f91aced056051d8ffe1da52e2428ae96c3d2b66d6447c90626fce959386f279426ab8ad95fd5d36890525a194652fb40aa729aa0414de5e8f28d0b0c46cdc6790672f2223925a0707507a004452412fadb83ffe278115ddf0a71fde3804e3a0394ed284b010f06a2ac7895a2f04eea574390c61f66e4c9f2688f54860b6498996055a4360e5aa2d5d60d6446ba1702514860b5100b3a702fb8b7f0d0aa40bbebeac57533174c680a9a12e1fdb5a9413b86b41ff4931c136f882b9914c4a04f7c9b187c27a54910431d3ead01eda9e1e90de0b9e238f43a7d7ff73574d712f1e5cc826a635592f60d2747ab2c362d1", @typed={0x8, 0x13, @ipv4=@rand_addr=0x5}, @generic="353d823a5e9fa6ae31e2087a57050429f08375d2e90926562c2fa945194259ba08c4cf473aefe0bbdf751be0da414009c818b792744952743532f48f1bf69f17b6d9e564e2f099057a0b9ed3bba6", @generic="9176e36a3cc34b121ce35ed0917f3e59cd377be90d0ec7f94aada2c9e0ad600935fa26fdf4015ce25d607b0c5436da4d46a40c1e2e748e3e2e13dddb6ab98fc4154c2deceee2a35857c0b798f3743e0e90549355517b0bd9b63c78ba9e3cccb47506bc7aff832da1ddaefe79b04c5b8866bcc4f4ae5bdaa076ebda3dde99003088b6f4f4c1b261a52c30239dae01bdaf76b2d0bde55bbd1352ef71b0dcee00970f702983dc3dafca774fb9c2a06d2023e3c609975d0fecf1fb535422ddded8b01e07ba7430c4dd7912", @typed={0x8, 0x6b, @ipv4=@multicast2}]}, @generic="44378f041cea878f541760bcd7bf8c6f862172aa0d7f50760344e290b062138df128fecc5f78eddd748c7d3156ffd2b9dfc1c20341a6a26a615a3d64e9ca8d9c4bf3f63540131c68aa97f99e512e8a9e296918423650d326a273eea7bbfb5238e6e88302107183ebe4f5704f11320cd21d66fec3a24747201f2c456f517e48e9aba9d2c1fcea34a4ebc6d053bad66758fc81d61bb0bf81dc0502478a6d8af0ee586867092e7e9ff2d0c1731dbb62fafa00296b343bf327229735e2", @typed={0x14, 0x13, @ipv6=@loopback}, @typed={0x8, 0x3, @u32=0xffffffffffffff01}, @generic="e8acbe4367c35bf7a2be596ca56e941c3480d98e25c553c91f46e574b5e4a06ce1d6a161a6ca35c9c1c80e4cfd3b8f0d58ddb62dd414e939a4c19343abe6518d1aa6ec1d3d06f131eeec42fa9b246e6f5127cd77", @nested={0x134, 0x8, [@typed={0x1c, 0x43, @str='/dev/bus/usb/00#/00#\x00'}, @generic="e83b1a0945cf92eed72d276d1020baccf5390f789acd242d7ade348d32ea6a144449f28476599b3f5a0562f00e6f876ada779ef8af893ac4ca59533faa3887debc3aba69314810b2960fafab15ca5a058e07a2527b298e722341ba61c99d61a2a9249ffc5e1f8a12ff29457f6ee6d24cb9e4735e6558ed3874ce914b2ff139291306469ef482ec37e463cfe8377ec4387fbc9b68037e2db826c9d7", @typed={0x8, 0x69, @uid=r2}, @typed={0x8, 0x70, @fd=r1}, @generic="9b8be72b67f53e6f9aea91cb085368fd91fa44f7b81482b45bc23f8db2b55c47c1e32fe1b96491b35dc5dc90740b9481f50d61104b9f3142d8edc9ef784122b13b0c94da271606596fd4c86b1e5b649cd78888cb65f1", @typed={0x8, 0x94, @ipv4}, @typed={0x8, 0x43, @pid=r3}]}, @generic="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"]}, 0x253c}, {&(0x7f0000003940)={0x2d4, 0x24, 0x100, 0x70bd27, 0x25dfdbfd, "", [@generic="1961a74e56d3161c56cec75a05223a7467bd817043d4bcaeeb5d773932a00348f3ed", @typed={0x14, 0x4d, @ipv6=@mcast1}, @generic="dbb0c57821ae1c8a524670", @nested={0xc0, 0x54, [@typed={0x8, 0x5f, @u32=0x5}, @typed={0xc, 0x60, @u64=0x7}, @generic="58958ba837090a5cf945bbc011cabfe749b71157df47200170cfd2ec33a4ccbcc5496982fe5b5664a5e7be8f4511c57f9800", @typed={0x8, 0x1a, @pid=r4}, @generic="80e9aa1a424eab74edb4234d7edb5e19cd86b4f11bef8eb32e87b70a24c71477fd1bcab3c67bd7a2719a114ff045ba9e03cf0f1634d11560cfa57673da9baee1347ac67f1d8c0c70be6ce645a0ac8c01ab79b53a76a6412c2ef86b623ca06d582db03a3a3603337256953806"]}, @generic="a416d892a206609cbe1989dcb29317abf02e3b2864a29f7822d6c1e50e746a455c2f9eb8afa51cbbf886f7e2adc8c74d19cc16ae8fabfbf84fe72de3642c0972f317994a70c842074366df33cd27be18b6da969c6d15b28d3bdcddc6bb68dc2ed3c21339601d59673e131d312f833ca0b81d897209d6aa7d777ec833a7fb9d7177d900d8eb67904e78a8b3735efa04719d4d206d7f233ceeff21ad4e377ba2d55fbdf33ea8a68a9e88370b12e4d9915e92fdd2b6c22c8cd879bba72b5f8e1f6e58a154a633c7a96aafe2b982d3f08e7fa1119c4d8d76cb2395dbd9bb21a28a9363baa3365691ee", @typed={0x14, 0x4c, @ipv6=@mcast2}, @typed={0x4, 0x8d}, @generic="fc10af5a0b74e220b70e6b179769908b22e6cc1ba9398096ad49cd80dffb2f64741c89945ef0f42b86a6c3d4793fd33adb16b2c27e250762af46642bdf556560de80107ff3c47bfe00aa12c9b7746d4f22d39a65f01d86e499d50ac1e456079c25d5374ada7129c39eebb2151067beb1cf1bb3287abb0e1521144c5967503b5eed66303e378f9429f1edd5f42103466257ae684a862e", @generic="1bf92b0a201753a4d4729313f4fb0c000dfdae53fb6ad4376108f5fc48059fcf5a4948d6d1cb224970e9dd1ad7c4"]}, 0x2d4}, {&(0x7f0000003c40)={0x100, 0x3e, 0x210, 0x70bd2d, 0x25dfdbff, "", [@generic="ffbba010d768f6144c64bd79a53c627be6e230878d9f7f44134e26f8bc3b08e3b68e105bd9210efa2c7a0dd2", @generic="29a87c6787ae4a2925b6db32dd0b96f77cee43f3ba96dd45a8974f137b7c009b4413a91a1aec5f3c868f67fdf5cb488edd3ed08d1bf5d2b90c314aba2ac7ae7056404bcf285754f439ac2d08f77e23a3b25fe773786db28c531160af7d11a2e674ac982385d2030dffba6cd720d7c90ea80c2f0730178878b97cdecde28b8c78d81bb9584d0cb8556f47b2bb4e7109c794fa2cf932de2f0a7e6b0f0028a68948ddebc469bcd899a7fa74425519a26cdde2777a78590e6cda66f95ce6f1814114da7399"]}, 0x100}, {&(0x7f0000003d40)={0x378, 0x30, 0x0, 0x70bd29, 0x25dfdbfe, "", [@nested={0x10c, 0x14, [@typed={0x8, 0x1a, @ipv4=@loopback}, @generic="317c17ca10528594b5c38be1ee9e7a477aaf4fd2aed57c5a69a5e22b4f57162eeb3bc10368a8a82e2bd256aa6595442a40004bcea6a5690a325b281c5b5b8063ecd5bb6c34aa4a807666e275e19ab2f1e368663dbf9c4b7ebddb6ed7b45fb3793bc0555666888d2b6c70323fe2a2dde1cf16e76f50a3a89749a94926d7f6bfad1ac0c13992de82861072d4eb846c90f509893870a248e08b378ba1d22dc69d2e8cf0d537d042330adfd255df8201ce030542c945802aec4574faf3fb2b276da8b55b23eefd632fc3812a3cdfcab3b8fbd20ba530eb7a1a722feacf959cdba9ed3c338c5ee28d9cbc01df65e6", @typed={0x14, 0x70, @ipv6=@remote}]}, @nested={0x1fc, 0x55, [@generic="03d31202d39e0ee25dcb932c615c1b5932a1d4efe1401bb1d7d90bf2e21f554fffd046420c82a8cead73a2e0a5ddc37849662087705a2b8df7ba3cfe3b3e8d6409484ce2cc86193e58a4e9faffa80024e264f1e552642df5f3d0babcc0ec0fe37310af570ea76658d55f63aadc9ff19c8733721e85a85ab425f97980228a6765fbebcda344dc5c536340c356fb34a927be2f5d2611634e426107793f49013ad3f29b6af750e277d671", @generic="9168391ddd2e4f65d6bc3fb9c957f0b45b5716a278c292ccd2b9", @typed={0x8, 0x6d, @fd=r1}, @typed={0xc, 0x21, @u64=0x522}, @typed={0xc, 0x52, @u64=0x9}, @generic="53966351fb0b5e18b1ce236f03a86f0be041007e9e9f01ea21f697e58313ff1d757fe0b516895ab7d9ff07c756774023231604bcb4b4461e6f99bd24f709db175e2d28455e5a5472c0670681ac0935f506c6655a357881136deac6ef4618726d4b90a7650d130562bcd62b7cbfcb3435ea859b15ef0ee4914a0237703be291498c09c1b48992a72c7692961860f50530dca04a57ff0519bb3da3c122d5360ca154d7d69f0479afbec02742d1f0", @generic="79de9d7846c324fcb96b22b26877938fe6e8b52c514f8bd1aefe5552bd8f8466bc7ad147ef7e9c6c34d284713f86f31c6a29167c03476a0d40ab453a69a95ad9915b3eb04079ddb0a0d845baedbf8dbbf4023e1eed1ed1ee80d720f032bcb78ae05d7636a7da8e5f"]}, @typed={0x8, 0x61, @u32=0x7}, @typed={0xc, 0x52, @u64=0x2}, @typed={0x8, 0xf, @ipv4=@loopback}, @typed={0x1c, 0x46, @str='/dev/bus/usb/00#/00#\x00'}, @nested={0x28, 0x8, [@generic="aa452df28bb1009f", @typed={0x1c, 0x2f, @str='/dev/bus/usb/00#/00#\x00'}]}]}, 0x378}, {&(0x7f0000004200)={0x31e8, 0x1f, 0x300, 0x70bd27, 0x25dfdbfd, "", [@generic="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", @nested={0x100c, 0x2c, [@generic="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", @typed={0x8, 0x9, @uid=r5}]}, @typed={0x8, 0x12, @u32=0x4}, @nested={0xd8, 0x77, [@generic="b5706bc8e2c5560fe1667fbb1dc347127f7ab73aeef319ba0bea760355443ecf88e8df07b097ba73a3b1fc16e68141c8ffee3b83785463e6cc58ab4ff4a15203eafce2e7ba7f3d85b7b2b0599fe2f32f9c71e535de234f90a01cd9e275f7809cd336ee8726564b7198791570f34889c4e74975b2c545325733d01b30a6daae02eb7d428d23d7bc5763959058f749bc25dbef236a8b56617506f88d1688132074ff6c1f9eeb7e47ff79b33ec530a241", @typed={0xc, 0x62, @u64=0x2}, @generic="6b4e13f5be51f9e3ecd92fbb4a506a879dd4f5539837"]}, @generic="21a774d38885ba98c33952115516f156384531e893364275f4946124ceb6dd3dad728d88ac3745290510d2c8fd4c37f8114af29af37f2c846865629d12ed6f2da8772280bb681e126d2f141883ad0e33acc121384da660568cd27677e709f326953d26150d89ed0407b12ad5a829a8717247b3bcad38f2e2eb149730e2a53121a929f2e8867676233ac5919c40ce21637d7b8d8ee971370637ddfa9a93", @typed={0x14, 0x20, @ipv6=@mcast1}, @nested={0x1038, 0x2c, [@generic="7cbdc21d3eec17af7aac3086abfcd6d264431883e408ba91897fd5506a17f3abc4c6473ebf53e9ca8cff3529a8ddbbfc8a9c6b369a9cc14d14c0b341818e09f45bff428a69d8a6a4f730448bbe782ef37884ff320789d0b117b4b687d2d73cb64fc71d46c725835e92f32f02ce134ff9f1225a4c7b3d497f6016e2f2ba374ab83bc31a72aac9be43e20a171e479595bd36f4ec16b956da08d01740e00fbe6f5cd6ce36715ced8ba0928106e2463ae430b3b4a79e7ae64672d0a5c6db344f9b9e91c90f9758a1448dd4783a52bf156999bda1975c806012a8fb400210a9ae064abd89a3b57ccc8a34e7dc6e67f290e42eb0078e1fbd014b2af03df573947dd2e9b2b1a63221397aaa2a8f193eab49d7cb9f7fa7beff26a797edff64e236049bb9c693df8a6819e6dde1191ff1294d8dea2b609a7d2d477a3f16fe97ae3e19d004864f83b5ac4c61067f6cf4835cb234e3a35deac0ccf6fb7d604e93d91c176f78af9e60ef55711527138cbaae14e86050d7c4c68965661102a6926ce3409344f23adc884552aedc47701d705d480ca960238ad71030fcc2a12fbc39d26898001c5a0ae93faff1ef48a5f1bfb5b3984329f49a078982b1047df7cac737cbda7027a5a84908c2489d23af7e185363e186e0c896d9e25f55ed7c86e5c22dedb295961e2607faf9934d82d6a3b825906416245c2bb8b8cdff799967939d90a0403745843cda0497a40a3e51857a1c88a107c0eeba62d108ca62221b9cd6cdfb5982c9ad8b943eefe1cbd9b8962956cbbd7b11dd00587126a9e808415e95ac8013bfc5f0633e9417c17d4491d895fe9ba68ab9aac93539b701140a53656dee6687ffb1a0657a29ade4a6762a91d53ed5f2ead4bbc82144f710039ea6e8dd25c6079425171e0286dd4e319e01dcbb15c0fc90cf8ea51323e113fbf008235ef2eb5101045f661540e8d7a0bad17448f84b978b78a15a3cf1c880a206fc5b78928cf04f92f111e0cfae0610967027cc954b1bd3624900f5c4460bc8fd3a9270d28aae99c2a3e20884ab1d98d0869d030ac28370cb8b0a3dc150d49b1d991684c8e300c1edf3939c14a559a00b1a6e76e4ca8471ebfa2bdb54eadd17dbe41760af6c23409889fd51ba724c57379b55ef95e265f3406b45e7149e018ac71abba6d204d207399a80b6d53db1ddcfe4afc6873d64416fcd7e83fc9663eb6e81874c297c6d903d6a50fc577331ab3f9a6ca318383d529e3048247a50557b93758f740b4371acb0679b528a5edeede4b8c5d9067254f1bf85b29b30cd588e479c998bfa2f9000161e115abf6f421a7a5dfca7bba42035a4624a27e136e3540109654e640fba0f3a1701499262dea7b693b70a8d7bec412656b79a4535c009b628dc0a0d29900d0e3ed24547722253381baaefb8df340ebd4d7af239806dbfc88cc06f6ca2c3a0cbd6744aedb23f1c410f59cb37602629b587fb1c1ec6a9d698d5e2a541bf3bac179443339e9d8701c659fd6bc490f304082f62e0b10f5fc9de1c5e82dd4877fb1166733fe0a7ec83606ad2e037371bf76464533884d5b64b4563824066c874aac5aca7831aa1a1a13df4fca4d4cb832e7ff7cc220422d554c7db71399f72bb070029c586135b1c2e342a9fe540c9be8289b1c00c793346e62e434d7259193119e223c447b3f14b9c201f329826a1b949abdf544b12c0844d6de0caeb0d42a3d2d60add74d4c5dd597f92dea42457f98eca02384641a2667c4d9e70dcd1940f125944593d7894665e0a93e4f2ca09b95f9bb452f5265b6e135c5b7a9ddb0ae0386e2462bbda102028913cd5b8ba042e3b41251366136d5545199d87eb5828afb91ac667cacb25d74046bfa278f15d939df61789077aaa65853b59c9cff6722ab5a7eb38e68ccfa830507b20684560b843861ba43490b543091d76ee9ac337f808eaf70068dedd75c266b3da660beb3960a4f088fc6df8b87c865555ab10f80b1cb77d498794517a0cef1dcb071c0465fb734511d92515e6e348efd072ea13d1f81d0967964a2a1116cade0ad5b0be5ba0e761a6c1dd16ddb91ea86c5b149432f7b4fcdcabbe436cc3e7da83e3244a9542031e2f57c42a4170cf0e07eae89504aaf66555c2a51f904a341377774f2586cf970ce08a0bd023adfba41ede215b0acf7ead0f11656975e87059023641fc3f859bb94b43f1be652131f78b3ac875136852436fa5c8f1140bd9d1a81466456ad510d261ad008c2e8d6923cab0a1816aa2dcc85cd17a9cfe9ea1e64982ae2a81e70222de7166fa8e70bd10ea8d0b08018419fb6591e7cfd28518774226fae961ae90e5141f2e88b40e9848581c26479750f4e7242699f5f97ed583c0193c03fc144b1a5dfa96f41a58294ea0a94f94ff7662e685f1811199464d1acf08a9050a355c7042ec6b0075567a4c1f709d2568204d8fe4c1627eb81aae1a4c412798c2b1ef801ee0ce9398339f58142355df51956bc8a543b3e158759a6ff447b4a7178d5bb772cef6eb05bf8e8286d191803f68f25c53947c566d44cd2e3c447fdba5b5afd2f821d2e9b6e3c83a451078e5cf158f782d2009cf17e5b40f9baf91c104de6b8b8ab1482f6d62a949ae79a97657c31a6a10d94166eb39214d1694ba5be106562ebd822ce9b05afa1b83258c8f63ef0c65ddb98287221fad92c9a591394443a92c6178fe3d15ec22a0629b4faaa37c74f7b0e04406c8fbcd3ac04979bae58d677def9ed0ff7b35d89f53b78c66b9a4008400e9c93e246ad34ab6e50a08d88692061b15a7c51bb7bd3cb5923fa20ef42d5cd820c9e1c3db0954b32a5cd6850d10d58b52b91afb3f6f03c65d3933b4792e3907b23248a088506a603127badbc4db7ca2ca5899c4a0646be1df5b859f3497c34dbcf80802d09e9857368fec2126c9991d31ab59108bec3a8a51d8b1d259b18c7eb6653eac9dbd4c1e6a5a0e27d233bfcff24a4a3fe7f4bbfa8444966bfa44c14e2fd0d97aa27521c0fd9e2f45efcffbf41baa6414e6dd3f2b37f0c42a5fb3654023eca1d121b4fd51c521cc14fea857a8cf77e8a8531738cc911ba5a2978619d22a6a1349eebdcab5c9e0b980b34fd6a5b06c7393311e97eb62cbe35cc256c34e6a3bce9d1c1b212102e10e4dbcc7def567e358afe17bbed8c2ee0b8cf282f89703e5794a342eff63af7ba1509eda417b07a87def5b246270da72f42679f435fb2448b399d0c3301d0261364800938b339ea64da0cad6f014b0c527313dab606e23dcf2e012bb33748be565bafba5d9afb8bd6e5f7c1cbd09f45bf70c6fb5ae5a80b06474bea6397bb1e99b62c2dacf6c4c4afd714bf6d26f7349aca3939ad80283d3a3bfda56e803ae2c5b23c7b1b68f451bd6980825fbf2517edd98374c2390707217a8e2141a84ab129579da32ab86120ca2849a5bf90dcaaaf0e2a476d678b19e8fcd5c63b3e85e531f830e2210ca1b59d875f2386c435e3f387d9a1e5fb0e61657acb47e342ca5bdaceab3f014467b53ec2997389f46ae9144fe5921a59778ef05785d73446469fb334f361ee3719640fb666cd4909bb3591f1ec5968b21c00d7179bd96e4acea9457828ef7e4d4cc23c3e8717016e7a9681adb48849475fdddcab774148dd61eb99dadc443c67616e8f8a99d4f70c5b42ef35ae8587dfa799a804a68d1d0e866cbe0051d444000149aaba3e4c16d96b5e49d1491fbe1819f94ea86c2b65603972e24717f103da35a1d9744234637c85e33cb90ba8aff73874d1da636a17c31813ea00362d16a543bca83a3951c9e6b5c5ce5ee2b66b062eb50b84042e6796368d8d2c3166346c8c2fbde77c1185d372cf4be1ac8cf71409bf4d47aea14f869e28d84284d96127a5a4b2b3e8af4aa6c1c69e80b9d183137321c250dde948a65687ba643a6b1c9740f6097598f9640d57f0f9ecad550f10edba989ea23378a5a7c6cd9d26d9b3b3b8e33a1a39755814777cef119d851464e0f9bc1e004929118c9b8b6d6a3277afc59568dac3332ec4fc42a458f2fbddbca5b90322cd79db22041557e92352ad485a3f78adb6ecb41aa5a5af25af953406548c8337c6614df6ff7ec2d9ea81c2f8028ec35b45db3ca07c9be60621cdf7f60804cfdaaff56bac3adc3eec7359439b830f6ac9ac2f4ab718d794a0fb8102bea04a03e4249ce975054f7bfa8c8fad3fdace9c203361556edad147c655eef65ca9c65bbb9cdaa1c0c63871785cc7f5eb65b718ddca0e6074ae8bf26bc74712683ed72f40d53a478557fb2e3c23d499f4343d4a1bf69d7a1550f595d4ab97d297b139f2ef4bc427e9e299f93acede61a0d68b31e7c228f7be89ab4ea74f0cc4b2252e5df5621cc81260423b8a40aec98c1a2fcc55819a4d840aa0eb610f748bff2eb5eceea207797564bf7797cae132e710a56f69f016838657a60734428c04b95931570477153772b3eb2dc8052de270d890cb0a5ec7dfc88d812c775223d922d5ef2a4a9c8ea89e9c0676c24a5e355954978f59af9701c6ff1a11ed620b38fb252b140156b92dd113c6d7e6854f9104084b0432303b6654d35f20c50a3aa7b7292967085ba8d18ed1bd286fb759b92c0e733a9deff05737a3f2f18d210cbf2e6047917c47e1c18888988c3888ddec5614e70158a29f10fd5b164a00e29eeab8b94fc14e4a6e23b092ee21c73ae0045ec77f116f00d1a7aaa93e7b95b7c5e27b5023c2e09911bf95d761edc380a0347a66d7d236a4acb399e8fec2f55bc3b23cbdec709a3eca30941bb50515cc1c1bdce5383b85d81604d1665eac24fcda0220a1b94401ad78bc2b4d25333e0e064fbdac835b8089cf29aeff92fcbb4d1992d37a84aecb5377e95c6408ee96a9c9d3aeb83eb9fd7dcb53a4e1306f79ce281adb0257ca4cd37ab905ec470345300f43933a9dc8daee1ad3d376b2ec878bb945e5908b82caa38e2265d396290b56dd32ba45fc74bcd388494e1ac7c34a2dbf5fc120de4dea935bac8203e2ef74d674a8323ddb114dab92a8ea502d4987c98b9c9ca018db25f58c14264cd710d6908fceb577556004bf9fdd0e91eaa487a6214cae15232abe39a2926de32ab6d86dada1482278f19ceef9866e11d9cdb51a930873418628b760ec321b85073ae6d9f5c7f67a08087727b8ef8199a199b0bdaeb3dd06d817775a000ff76b6f997af35e8ad8abe3a1163aa52735c69bdc823ad2b864ebfa88cdad41e199e12b2d3d6a16a5acf336ea3055910be3fd4f69ee1b35b8f264a51d6bf4e730b86468c82a6af10f3b8071c1ca63570110abe38b45c134c89cc481a24fe0158d97bea48ae1b56e3a1e865b95d1828346bfe6f00d8b3f3ff008996037114b8c16d544918a1da86308a458b037ed71a5229bac25c041701f7fdd6d51dc67f6d963bca13813cec75a9f94e7a45b0b616be0e7756d9c2b013846f7deee5dbbad912eaecbba4a6bd16f5d4b115fc11abe90ea3660d4b7e7e51cdc119fc3e5498eb0820ef6ae12469306e92d5a52decb5681e98d21df181d75b4be71363b5652d55b79827fbb68c490b1fd7b5c28471848f1baa925e6f54130d5d9dafc7ed43a27ea4b0e97b46f5d327f4d2f4cbe212d7a60dbca88a42089012c53539963c1190a963517a90255360a2702ae3a902af57209c8a717008db5046d21b0e4d4836f331f824e45ef11994c10f2652020122c0f19b47d2abb6fd80b4841a4a32516e9596bdfaac8d596b74502dea837436da4dc9f20f805b40b4835b34e1b0c22fd0b683aab0ee2af6b0050c3a2aa6b362cca72daacda7f9dcfaf880d4", @generic="a7f0e8993c1c", @typed={0x1c, 0x43, @str='/dev/bus/usb/00#/00#\x00'}, @typed={0x8, 0x14, @str='\x00'}, @generic="e195f3a64765b12e"]}]}, 0x31e8}], 0x6, &(0x7f0000007480)}, 0x4000000) [ 734.917849] hfs: unable to parse mount options 21:31:41 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x6c000000}) [ 734.960213] hfs: unable to parse mount options [ 735.004671] hfs: unable to parse mount options [ 735.022513] usb usb9: usbfs: process 16834 (syz-executor4) did not claim interface 0 before use 21:31:41 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x10003dd}) [ 735.070496] hfs: unable to parse mount options 21:31:41 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x5, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 735.125075] usb usb9: usbfs: process 16847 (syz-executor1) did not claim interface 0 before use 21:31:41 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x74000000}) 21:31:41 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x8, 0x400) recvfrom(r0, &(0x7f00000000c0)=""/15, 0xf, 0x21, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3a) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000005c0)=@int=0x8, 0x4) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r2, 0x400454ce, r4) recvfrom$inet6(r2, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r2, 0x80081272, &(0x7f0000000040)) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000640)=0x3, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) r8 = add_key(&(0x7f00000002c0)='user\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000800)="0f1378ada1a6f0108b7363e6a258b3287fab6372b187b5ccbb9c680d80026e48dea6e57ae58dd93632d554c1acda51da92655e96fa006be6374da588df59383138420fa974381c7dd32bceb82c653899a8dc853478a61b90ade158f16a1f91da31c4e4a7e2e9346affe20a262ad289fffb8efb04819a2cc732e839f72310e608634fb701da86970036b10a09a351b6e397e428bf3382b1aea2ef82c08c086cd02325e4e4820237774e96c021f70757ce9c4cbb89a83a223a8989d2e7a19aec4c6d19e45e383cedb241334205b525231c84ca9e78ec4b6c52933b3cf386ff6579fd265b462841f91d60f5005e43c48fbfd69e", 0xf2, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r8) io_submit(r7, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r6, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:41 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x16, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:41 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) ioctl$RTC_WIE_OFF(r0, 0x7010) 21:31:41 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000300}) 21:31:41 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x6000000000000000}) [ 735.305296] usb usb9: usbfs: process 16863 (syz-executor4) did not claim interface 0 before use [ 735.330292] hfs: unable to parse mount options 21:31:41 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x7, 0x0) write$P9_RSTATFS(r0, &(0x7f00000006c0)={0x43, 0x9, 0x2, {0xf84, 0x5, 0x8, 0x3, 0xfffffffffffffff8, 0x6, 0x7, 0x5, 0x3ce4}}, 0x43) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f00000001c0)={{0x1, 0x7, 0x1, 0x5, 'syz1\x00', 0x2}, 0x0, [0x7, 0x1, 0xffff, 0x6, 0x7, 0x40, 0x6, 0xfffffffffffffff8, 0xd5c5, 0x4, 0x5, 0x5, 0x10000, 0x0, 0xc14, 0x10001, 0x1ff, 0x7ff, 0x7f, 0x101, 0x6, 0xffff, 0x3, 0x3, 0x6, 0x7, 0x1000000000000, 0x4, 0x101fd14, 0x1000, 0x6, 0x8, 0x2, 0x2f, 0x73d7, 0xfffffffffffffffe, 0x7, 0x78e40000000000, 0x40, 0x8b93, 0x53519849, 0x5, 0x1, 0x4, 0x120, 0x8001, 0xaf2, 0x4, 0x4, 0x3f, 0xef, 0x0, 0x0, 0x80, 0x1f, 0x5, 0x351ef8ea, 0x4, 0x9, 0x5, 0xffff, 0x9, 0xfffffffffffffff8, 0x10000, 0x1, 0xfffffffffffffff8, 0x100000001, 0x400, 0xffffffff, 0x3, 0xfffffffffffffe01, 0x3, 0x4, 0x1, 0xfffc000000000000, 0x1, 0x6, 0x7f, 0xffffffffffffff01, 0x8000, 0x7, 0x8, 0x3, 0xf40, 0x3, 0xb3780000, 0x2, 0xd63, 0x11, 0x3, 0x43d, 0x2, 0x3, 0x0, 0xfffffffffffffff8, 0x8001, 0xc44, 0x2, 0x1, 0x3201, 0x3d1, 0x2, 0xfff, 0x100000000, 0x3, 0x6, 0x8, 0x7, 0x7f, 0x3f, 0x0, 0x8a, 0x8, 0x20, 0x2, 0x81, 0x80, 0x5, 0xffffffffffffffff, 0x4, 0x0, 0x6, 0x4, 0xfff, 0x80000000, 0x3, 0x6, 0x9bb2], {r1, r2+30000000}}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000800)="2f70726f632f7379732f6e65742f697076342f76732f73796e635f7468726573686f6c6400995c13f7c3501e989b42640daafd149eb145cdca5c26054757be59e33fda761ce1df834ae6e3cdb12032dc18a323fa96013279d8b24f8ebf8b499b607c7d030fa5297235ef1aaa33ccd4de1368eadf333a23574d792d477a9f5b2e043065511c705298f4a36ba9d9360e7fce46e0412fe71662178295f85e5250ff7dbeccc93418448cb9eccb3927d477ee239aac3ee5d5", 0x2, 0x0) r4 = dup(r3) r5 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r4, &(0x7f0000000900)=""/4096, 0x1000) write$cgroup_int(r5, &(0x7f00000000c0), 0x12) ftruncate(r5, 0x80080) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000180)={0x0, @local, @rand_addr}, &(0x7f0000000740)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000780)={'vcan0\x00', r6}) sendfile(r4, r5, &(0x7f0000d83ff8), 0x2008000fffffffe) [ 735.367148] hfs: unable to parse mount options [ 735.408456] hfs: unable to parse mount options 21:31:41 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000340)={0x6, 0xfffffffffffffef6, 0x306, 0x0, 0x12}) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', &(0x7f0000000080)='/dev/bus/usb/00#/00#\x00'], &(0x7f0000000300)=[&(0x7f0000000140)='GPL^\\em1/\x00', &(0x7f0000000180)='\x00', &(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', &(0x7f0000000200)='#$/*eth0^nodev\x00', &(0x7f0000000280)='nodev\x00', &(0x7f00000003c0)='/dev/bus/usb/00#/00#\x00']) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) [ 735.429796] usb usb9: usbfs: process 16888 (syz-executor1) did not claim interface 0 before use [ 735.431075] hfs: unable to parse mount options 21:31:41 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x6c00}) 21:31:41 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000009}) 21:31:41 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x30, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:41 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) r4 = mmap$binder(&(0x7f000007d000/0x3000)=nil, 0x3000, 0x8, 0x1010, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f00000000c0)={r4}) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r7, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r6, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:41 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x6800000000000000}) 21:31:41 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x10, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:41 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x6) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) ioctl$NBD_CLEAR_QUE(r0, 0xab05) [ 735.648893] usb usb9: usbfs: process 16913 (syz-executor4) did not claim interface 0 before use 21:31:41 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000067}) [ 735.711088] hfs: unable to parse mount options [ 735.746151] usb usb9: usbfs: process 16923 (syz-executor1) did not claim interface 0 before use [ 735.755840] usb usb9: usbfs: process 16913 (syz-executor4) did not claim interface 0 before use [ 735.793890] hfs: unable to parse mount options [ 735.801376] hfs: unable to parse mount options 21:31:42 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x2}) [ 735.855683] hfs: unable to parse mount options 21:31:42 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400000, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000180)=0x4) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={@mcast2, 0x6, r1}) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0x4004550d, &(0x7f0000000240)) 21:31:42 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000063}) 21:31:42 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x1a, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:42 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x4800000000000000}) 21:31:42 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0xd, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 735.999961] usb usb9: usbfs: process 16951 (syz-executor4) did not claim interface 0 before use 21:31:42 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x101080, 0x0) 21:31:42 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x100, 0x830) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f00000001c0)={0x0, 0x598cb987}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x5, 0x6, 0x4}}, 0x30) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000000300)={0x1f, 0x5, {0x7ab, 0x300000000000, 0x7f, 0x3, 0x7, 0x5}, 0x4, 0x6}, 0xe) r2 = dup(r1) r3 = open(&(0x7f0000000200)='./file0\x00', 0x20141042, 0x0) read(r2, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r3, 0x80080) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000240)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000002c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x3f0a, @mcast2, 0x1}, r4}}, 0x30) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) sendfile(r2, r3, &(0x7f0000d83ff8), 0x2008000fffffffe) [ 736.052520] usb usb9: usbfs: process 16959 (syz-executor1) did not claim interface 0 before use [ 736.075667] hfs: unable to parse mount options [ 736.094403] hfs: unable to parse mount options 21:31:42 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x74000000}) 21:31:42 executing program 0: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x6) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x4004550d, &(0x7f0000000240)) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x100, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) truncate(&(0x7f0000000100)='./file0/file0\x00', 0x0) listxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/59, 0x3b) 21:31:42 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000066}) 21:31:42 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x6}) [ 736.134620] hfs: unable to parse mount options [ 736.143908] hfs: unable to parse mount options 21:31:42 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x17, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:42 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0xc, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 736.284179] usb usb9: usbfs: process 16982 (syz-executor1) did not claim interface 0 before use [ 736.352071] usb usb9: usbfs: process 16994 (syz-executor4) did not claim interface 0 before use 21:31:42 executing program 0: r0 = getpgrp(0x0) r1 = accept$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f0000000100)=0x6e) fcntl$getownex(r1, 0x10, &(0x7f0000000140)) r2 = getpgid(r0) modify_ldt$read_default(0x2, &(0x7f0000000180)=""/109, 0x6d) tkill(r2, 0xa) r3 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) getpgrp(r2) socket$inet6(0xa, 0x6, 0x3) ioctl$FS_IOC_FSGETXATTR(r3, 0x4004550d, &(0x7f0000000240)) open(&(0x7f0000000000)='./file0\x00', 0x80000, 0x80) 21:31:42 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000080)={0x1, 0x0, [{0x1002, 0xc2, &(0x7f0000000800)=""/194}]}) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) epoll_wait(r1, &(0x7f0000000640)=[{}, {}, {}, {}, {}, {}], 0x6, 0x3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) recvmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000700)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000000900)=""/77, 0x4d}, {&(0x7f0000000980)=""/201, 0xc9}, {&(0x7f0000000a80)=""/139, 0x8b}, {&(0x7f0000000b40)=""/214, 0xd6}, {&(0x7f0000000c40)=""/105, 0x69}], 0x5, &(0x7f0000000d40)=""/130, 0x82, 0x8}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f00000002c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) r6 = openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0), 0x117, 0xa}}, 0x20) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r7, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:42 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000012}) 21:31:42 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x20000000}) [ 736.458526] hfs: unable to parse mount options [ 736.473374] hfs: unable to parse mount options 21:31:42 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x7400}) [ 736.547853] hfs: unable to parse mount options [ 736.555447] hfs: unable to parse mount options 21:31:42 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000010}) 21:31:42 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x7, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:42 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) fcntl$dupfd(r0, 0x0, r0) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) write$eventfd(r0, &(0x7f0000000000)=0x1, 0x8) [ 736.654243] usb usb9: usbfs: process 17027 (syz-executor4) did not claim interface 0 before use [ 736.667878] usb usb9: usbfs: process 17028 (syz-executor1) did not claim interface 0 before use 21:31:42 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x29, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:43 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r1, 0x5860fe12) openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x10000, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 21:31:43 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) open(&(0x7f0000000080)='./file0\x00', 0x80100, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) r6 = openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) ioctl$KIOCSOUND(r6, 0x4b2f, 0x7) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r7, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:43 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x6000}) 21:31:43 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x3f00}) [ 736.816508] hfs: unable to parse mount options [ 736.822892] hfs: unable to parse mount options 21:31:43 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7, 0x10001) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000100)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), r1}}, 0x18) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0x4004550d, &(0x7f0000000240)) [ 736.887512] hfs: unable to parse mount options 21:31:43 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x74000000}) [ 736.916646] hfs: unable to parse mount options [ 736.935368] usb usb9: usbfs: process 17060 (syz-executor1) did not claim interface 0 before use [ 736.965681] usb usb9: usbfs: process 17063 (syz-executor4) did not claim interface 0 before use 21:31:43 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x6, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:43 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x19, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:43 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x7a00}) 21:31:43 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) r4 = accept4(r1, &(0x7f0000000080)=@l2, &(0x7f0000000140)=0x80, 0x80800) setsockopt$inet6_udp_int(r4, 0x11, 0xa, &(0x7f0000000280)=0x3ff, 0x4) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000100)=0x0) io_submit(r7, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r6, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 737.052700] usb usb9: check_ctrlrecip: process 17072 (syz-executor7) requesting ep 01 but needs 81 [ 737.062090] usb usb9: usbfs: process 17072 (syz-executor7) did not claim interface 0 before use 21:31:43 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f0000000000)=""/28, &(0x7f0000000040)=0x1c) 21:31:43 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x4800}) 21:31:43 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x68000000}) [ 737.154214] usb usb9: usbfs: process 17079 (syz-executor1) did not claim interface 0 before use [ 737.179534] hfs: unable to parse mount options [ 737.196487] hfs: unable to parse mount options [ 737.249766] hfs: unable to parse mount options 21:31:43 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x2}) [ 737.312940] usb usb9: usbfs: process 17102 (syz-executor4) did not claim interface 0 before use [ 737.325375] hfs: unable to parse mount options [ 737.348900] usb usb9: check_ctrlrecip: process 17104 (syz-executor7) requesting ep 01 but needs 81 [ 737.358123] usb usb9: usbfs: process 17104 (syz-executor7) did not claim interface 0 before use 21:31:43 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x21, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:43 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) fchmodat(r1, &(0x7f0000000080)='./file0\x00', 0x10) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 737.428586] usb usb9: usbfs: process 17110 (syz-executor1) did not claim interface 0 before use [ 737.567786] hfs: unable to parse mount options [ 737.622364] hfs: unable to parse mount options 21:31:43 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r2, 0x80080) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) r3 = socket$inet6(0xa, 0x3, 0x101) sendfile(r2, r2, &(0x7f0000000100), 0x2008000fffffffe) fcntl$F_SET_RW_HINT(r3, 0x40c, &(0x7f0000000240)=0x6) 21:31:43 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x16, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:43 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) 21:31:43 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x500}) 21:31:43 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x300}) 21:31:43 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x400000000000000}) 21:31:43 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x13, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:43 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x400, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 737.798225] usb usb9: usbfs: process 17151 (syz-executor4) did not claim interface 0 before use [ 737.809889] hfs: unable to parse mount options [ 737.809909] hfs: unable to parse mount options [ 737.816272] usb usb9: usbfs: process 17152 (syz-executor1) did not claim interface 0 before use [ 737.836772] usb usb9: check_ctrlrecip: process 17153 (syz-executor7) requesting ep 01 but needs 81 21:31:44 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$KVM_S390_UCAS_MAP(r0, 0x4018ae50, &(0x7f0000000000)={0x1, 0xab, 0x9}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x400, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) [ 737.845993] usb usb9: usbfs: process 17153 (syz-executor7) did not claim interface 0 before use [ 737.882296] hfs: unable to parse mount options [ 737.884751] hfs: unable to parse mount options 21:31:44 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x68}) 21:31:44 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x500000000000000}) 21:31:44 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0xa00000000000000}) 21:31:44 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x36, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:44 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, '%so8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 738.046951] usb usb9: usbfs: process 17173 (syz-executor4) did not claim interface 0 before use 21:31:44 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0xfffffffffffffff9) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 738.093615] usb usb9: check_ctrlrecip: process 17177 (syz-executor7) requesting ep 01 but needs 81 [ 738.102871] usb usb9: usbfs: process 17177 (syz-executor7) did not claim interface 0 before use 21:31:44 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x4c}) [ 738.134134] usb usb9: usbfs: process 17183 (syz-executor1) did not claim interface 0 before use [ 738.146882] hfs: unable to parse mount options [ 738.212438] hfs: unable to parse mount options [ 738.235385] hfs: unable to load codepage "%so8859-4" [ 738.240674] hfs: unable to parse mount options [ 738.280996] usb usb9: usbfs: process 17201 (syz-executor4) did not claim interface 0 before use [ 738.350421] hfs: unable to load codepage "%so8859-4" [ 738.355682] hfs: unable to parse mount options 21:31:44 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x600000000000000}) 21:31:44 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000040)={0x66, 0x5, 0x3b, &(0x7f0000000000)="0e0bc315286b35feebe37d9280222eff48caa9cffe4b34fd3090f50207385784a4a8e462b82525d8bdd093281eafd4f937d88bb2f215fa66229388"}) 21:31:44 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x1000000}) 21:31:44 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f00000004c0), &(0x7f0000000540), &(0x7f00000002c0)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) ioctl$KDSETLED(r1, 0x4b32, 0x6) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000700)="feb782633cda85f13e816dac286c54eb3ad4960277152e7be48f579438eb37c2412a9cba26970c8e93e2d24aea023c1e3d983d8fd58643c95a61a5088f00ff7b2acae802d394259b9d24a5916d078189248155b2779dd10d015bde67e28cb7c09a05cee05ab59f64925bcc4b4f1cb50048a87ddb4207064853f318100f16a80273238eb5cc17b75ebc0b1bbc28cc25c8f9769af2e8bdf144999931", 0x9b}, {&(0x7f0000000080)="dfde00047d79e2ef783dd03ceacae8cc153d560ac5a7745af82d2c9b3f3535f9d0", 0x21}], 0x2, 0x1) r6 = openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r7, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) ioctl$GIO_UNIMAP(r6, 0x4b66, &(0x7f0000000500)={0x7, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}]}) syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x7, 0x111040) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000580)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}, 0xfffffffffffffffe, [0x0, 0x0, 0xffffffffffffffff]}, 0x5c) 21:31:44 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x32, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:44 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x6800000000000000}) 21:31:44 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, '\nso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:44 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = dup(r0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000840)) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000000900)=""/4096, 0x1000) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x4, 0xa, &(0x7f0000000700)=[{&(0x7f00000001c0)="a307645f0a7cf247ec99508fbabbd752be28133679f724d75cd5b332866c98d3c297995df23ad6e098520f637cf8934fa6949e501531b8be73ee5c325ff8106df25a01677b", 0x45, 0x1}, {&(0x7f0000000240)="a30d4e34a8ce172b8cafce7590ae3e4b7f47373bd7920d237f355c77f5b573b9622c0e4f5778ab1d012f62a7b00293f8c4ce0d9db9b88f30787a4f203655b92dad79766e280912dd2301b5a8ed77b0d5d620904a5dea0fe0450167c3e04f14b61f9d094a910bbe82645c3d02f089e14effe6851ceba4c6222e36bda0fb3eb5af6dbfdceab1e4bc5d8af967f388c61e394f03cb39f660304d06e5f27dce6ced66", 0xa0, 0x4}, {&(0x7f0000000300)="155e41c85bc2d4a2b93d12bb122db298ab397d91afa28a77f63caec5b41c182f9c2802f718ef10186371270768595291a75963b4e97e78a169ffb9108f91640b468f6986099e73c6913b07eaff6c07581735dd25b0d5b705cee9d302bbbe5aa22d3b29c3c147f5644d63571a317a14ece8", 0x71, 0x20}, {&(0x7f0000000380)="3628f051ea9f642caead7caa408e48521ad07074d0db8d480017da929118efa8b643648f7b10ab4e5ac05d35379e9878b0bcf369e34329b7f526ba0d02e7783ecc18e2289953e126396124d848604148b128b8c296c7612c1e41066e14d6c03802f3fec745de7234f22fb69c5c", 0x6d}, {&(0x7f0000000400)="9d0e724282be6b6e6e829596cd8cd7356ebc52818fd9ed4c539b411638e7b6f8935065883f183189129c75042ca1c327af9a351472f061eb94b214e41b833d0931c95dc04c101947d6ce6c93c3afa4e2dde15a7540aa83d2d49d5ffdf226b14c2c048bcb8c841b19978a59a5d59a64f9a634a54a93639ef4fc", 0x79, 0x1}, {&(0x7f0000000480)="22baada92d70af5b97841e083ba9d85a8e4b66dfcc0c0fbb83117b3d0609eb87ea47919e038f45cfb9a30a40e66976041220f1be00be8ac8efc477e7b82336bf90e38b1eb8b534b2c4d741a6c6e564c2800ed0d9856bb6684c4e67c07607ef7536bdd31783b057da4c02c26d560180316db4c8908fc6f209010c9b8e46a0acb6567656ec8413650b568a2b0ec39baabd8c7a3174f82aabe21e4458b62718eac1444e0153e952ba3c600abbde208378c1b616b4c2c54108bb6a609b5b8a498c67eed1c9", 0xc3, 0x4}, {&(0x7f0000000580)="20d4c0053422c68e5457283f99df660f1d705efda605122be73f67be79f0bf3abdb230ff0123be4262cc93e847efbc51c86b60e8c71791516d22db4306296cf3a02368bf", 0x44, 0xfb}, {&(0x7f0000001900)="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", 0x1000, 0x4}, {&(0x7f0000000600)="7cd5e873da8da23b61aaf5079b897c121eee4da27da7b5ac991ebd12a7e53cedbae37b4f96a0393e869f2b9fddd4ac86bcaf1f1bcb3e5be98607fccf9bf793a48ae62826b652ade51280747ef087db72c084e9fd4552ca2802203786888f467400a9e05b04531b4ac31f", 0x6a, 0x7}, {&(0x7f0000000680)="49325d2f2b97139f58e1ec6d79929f634b1e0bb510ec16175dab980ac0641bcfb84efe31ebc1a94b4e00c74b1fb43ed6d7eaf531cae181705736ce16a65cd29b8feed86541c52a7427ee83946f1613a67c43a92e9862ab97deb332797043361a15eab625a1511ceab682a775ba0819a616854015213d5abbe7c98260", 0x7c, 0x5}], 0x110004, &(0x7f0000000800)={[{@noquota='noquota'}, {@data_journal='data=journal'}, {@hash_tea='hash=tea'}, {@notail='notail'}, {@hash_r5='hash=r5'}, {@errors_ro_remount='errors=ro-remount'}]}) ftruncate(r2, 0x80080) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 21:31:45 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000000)=r0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000080)=0x7f) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000040)={0x2}) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) [ 738.837577] usb usb9: usbfs: process 17247 (syz-executor4) did not claim interface 0 before use [ 738.848386] usb usb9: check_ctrlrecip: process 17250 (syz-executor7) requesting ep 01 but needs 81 [ 738.857586] usb usb9: usbfs: process 17250 (syz-executor7) did not claim interface 0 before use [ 738.867568] usb usb9: usbfs: process 17251 (syz-executor1) did not claim interface 0 before use [ 738.878371] hfs: unable to parse mount options [ 738.923658] usb usb9: usbfs: process 17251 (syz-executor1) did not claim interface 0 before use [ 738.934103] hfs: unable to parse mount options 21:31:45 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x4c00000000000000}) [ 738.963960] hfs: unable to load codepage " [ 738.963960] so8859-4" [ 738.970697] hfs: unable to parse mount options 21:31:45 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) tee(r4, r1, 0x9, 0x2) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:45 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x2f, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:45 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x5000000}) [ 739.072408] hfs: unable to load codepage " [ 739.072408] so8859-4" [ 739.079141] hfs: unable to parse mount options 21:31:45 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000040)={0x2, 0x0, 0x40ffffffff, 0x4, 0xb78a}) syz_mount_image$ceph(&(0x7f0000000000)='ceph\x00', &(0x7f0000000700)='./file0\x00', 0x740876c4, 0x0, &(0x7f0000000740), 0x2c0800, &(0x7f00000006c0)="fb277070703004766d6e6574302500") 21:31:45 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x200000000000000}) [ 739.125437] usb usb9: usbfs: process 17277 (syz-executor4) did not claim interface 0 before use [ 739.217627] usb usb9: check_ctrlrecip: process 17288 (syz-executor7) requesting ep 01 but needs 81 [ 739.220766] hfs: unable to parse mount options [ 739.226997] usb usb9: usbfs: process 17288 (syz-executor7) did not claim interface 0 before use 21:31:45 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'i\no8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 739.293194] usb usb9: usbfs: process 17296 (syz-executor1) did not claim interface 0 before use [ 739.295120] hfs: unable to parse mount options 21:31:45 executing program 6: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = dup(r0) r3 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r2, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r3, 0x80080) ioctl$VHOST_GET_FEATURES(r3, 0x8008af00, &(0x7f0000000100)) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000300)=0x604) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000380)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000400)={0x1, 0x10, 0xfa00, {&(0x7f0000000340), r4}}, 0x18) sendfile(r2, r3, &(0x7f0000d83ff8), 0x2008000fffffffe) io_setup(0x524f, &(0x7f00000002c0)) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000440)) io_setup(0xe9, &(0x7f00000004c0)=0x0) io_cancel(r5, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0xe864, r1, &(0x7f00000001c0)="a8fee57f8695f3e5a21c9112afff04a447f14abdff1284a41f972a225ad82563c44a007e3920ba859ac352a99dd1cbeea1282d80372d6ddc8c77b99e990c0f77a6624e9d9a94ecf8232047d6c157563e91d39702bc9de554da4bdb3ab8c6681745cdd9199876d36f409e55df9badd41aba57786e2b1052dfdb9acd6c33fb67d5dcc0fcc31d3d7aa2608de4", 0x21, 0x3cce}, &(0x7f0000000480)) 21:31:45 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x68}) 21:31:45 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x4}) 21:31:45 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f00000019c0)=""/247) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) r6 = openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r7, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) pwritev(r6, &(0x7f0000000280)=[{&(0x7f0000000800)="1b5443c47189ef5cf61a79a311b26809d30dde790b68beff9a90f64605b899dac027ff7320c1670ade2157645446d3f97255cba4abb6d236d26a44dc747ab5c1d33f9764def6ec295dab37b198968c598931739bfa3f95d573febf1b94aa9a2198d862aaa9e7e4828561dc02c4bd6a332d8b168010134225eac64aab515ee7c4530ebcca108715453eda4e6714f907b6398afe14f918440df1f59df592dbbe3f521a665632f2bdd82235753771508e929007ba4d88e8e50e4d207faa19de79eba9721aad79bfb59710c84763e32dcca938a4336c51d21aae", 0xd8}, {&(0x7f0000000700)="b39abdbf1590f60a7c18e2c8eaa4900b5a1d93f47b78fc9521d9275248a059ab3dc88042c2dcd1f5ca5b6e356075402441a0102a67e9b652fa46d4c6cae2e859fb11bedbd55dbe47b30f0edfd42e1674869e99f084118369290fdae8ff176cb53a379f30d635909263e23a8c597a9bc4a5827d09b5c14e69624ce1ca804ef8485b57", 0x82}, {&(0x7f0000000900)="da1356f4f1acb633a680001bfafc8c27d8587267798a419922e9f337ce0f0d86e82dd3bffdec56492b32193dc3626efe6c5582e059c5542dfd9c975a82d122d4dc028375aeec0001fe368f36262198e01f301a6ad4abd4ad505f06b2223c385ba7ce5ec412305c40067a4d1ae94e1473bc22ba87ec3be1d98f814434233e3dd61efe17b586a9bb6939bdc71a4e218d1f9fabaa", 0x93}, {&(0x7f0000000080)="c78b66b5c732f33991470329068d456c1835a55c9cc479936fa8f761915fe2186f3e1acfb47425ba1d7f2958d9425b9849e185ae817d0813863857edfc7b1bf1932f5eb3e179a3984d9888cb0a304ce81cfec065aa96df3900de863bcdb2d61516c46acda4dc52ec55240a0413da", 0x6e}, {&(0x7f00000009c0)="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", 0x1000}], 0x5, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:45 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x10000, 0x0) getsockname$llc(r0, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x10) readlinkat(r0, &(0x7f00000015c0)='./file0\x00', &(0x7f0000001600)=""/94, 0x5e) ftruncate(r0, 0xcbe) getsockname$llc(r0, &(0x7f0000000140), &(0x7f0000000180)=0x10) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x4004550d, &(0x7f0000000240)) writev(r1, &(0x7f0000001540)=[{&(0x7f0000000280)="14309c7ec5e2a3c311d8d6050000004184c181616d938e93e52ea7e6b822d9a924b4b5e9ca919198e2fa60bd86341d2bd13f3952bc3f9e4d8e5f909d62b6", 0x3e}, {&(0x7f00000002c0)="4be6a6b9dd28528c48260b4a59d17b4ee0d15d24137779bdb229e38e5a8d03a92f2419473c7785a3a2f5ffefb92a37a7f6a70971586a2ca525c9817aaed24c6a921f3127872544e387c566d84d575c0e7339801a0b79d2a74035118fcd223eac4162039eb58d06635a69030368d0ad6ba06c05bbe93d36d6cedd157ea930071c12641c24a2d30eeb97e74ea4644a", 0x8e}, {&(0x7f0000000380)="0621003f081bd0aa722bba58ad657c0d4c24324c0652f9d92f8fe830b265efad5747b0931e38236eb365417fce253cf114b9e4152db89d6320e189bff13c3c28d1ed306e1e28b6c3bbeb76d6ce18dfac0476f68b4c954b857d4b967f0e32fedfb4248e5963c5abb45036ba2b5a0253be9314e9062c4de87accbfe822a178e4ec2dbd83a07547341a9e74ee7561bbe570a26b5d24e45c9f568faf9568096b29813b1f4c832dc056271657bf27bd6cec335fd822d2cfe9eda0e2dcea5c1c5d4f9c13d5e8ed", 0xc4}, {&(0x7f0000000480)="7bb587c3cc952c04ad5082ecb509dbeca4447dcd46a66d7f5066677e37eb36892137ebe01145b6fe98115c42596066a8f0fc140584e42486a2137efe849936ed4e0eed441a1cb186f1252dae5dc6229108e27dc37038757fd704a21d2cc0d58638b4ef19e9b50ebd03edc7751e0da047d406816c4a41e48a7cfe70dfdb1a2cb2f804277fdba40d3c0902ac184aa37742f8e6c48454515bd39788befc235bc075e157484f5c24079755", 0xfffffeee}, {&(0x7f0000001680)="1cf034249bfc33e9683665d580a4f2603562a442de5077aa2a61b5a9806af39f2664871f0a3c2b64b15acccbb3a44b4b2bb8c98a473c47d16f122e1fdf6b05b1dd1c10bab6e59d8cdc528fab25851b18c0205e487e3d45932009aba83643cdb310404b16cf87ffe19548e30dd60b7595632fc68d1688d2d85b4a509da369aea3f6bc8ed97f2127a50b49edada5a282b4ac85068b727276c2d7d14eb6a5d33b0624c97dbdb3b4e63a9b762a24bf724038272f6e62c71a714be6afe5b7e2dba257ab322330ef3bb858ea9720af2a09a9b1b254e46f25e9852b9d515df6ee982213b3e906c49947a88bc92d4cd1432b03eb21657322b523a11c32b9ce691fbbba0b0375549aa4703f7901c214b5ef9cbda91a5514a2d8013db2b88e7256e93989078eedff0862c0da369c679dde7a6d9b62bd4e1a4adaf6b30233c93978cf299bd798c1034e0792d2c7dfa2110dd303fa5e14a3c7c40bed9fc8e7dfa64e3f3a6f22440d08d9143e26673499ed97d5f3c66d29587465b444757542502d53b041689a79c0cf1d1dc51e3be2c674d2d8c3b531d1b612b6f0d7e14e637735200c7ec454849573a66d4f5dd3df3421ebca7bbb28c5f172f9723b78b3cfc77bd875425ff642031c12a745e8b8f2532e351e495ad943e2bc4568db1cc99ea095b9c0864b021118fdd56b39ef090fc2d8ff096c97a7ade9d654d3878bc3a87bb43ef770d960b143f77c0533e71155a738a66dc1d9e7ccd9fc8d4f948a282e0f8018a2b712dbb7bb9de8a9596d87f39c19ef555a196522bba0f70d893fb5dba9a4a7e02686e505359112319e7b07548f9dd0008d26bf335936e4a54fe22fece63a671ae9ff164f49c762c13ed708fe4cb426f2319ba484e94fe7298be950c8ea426e02c993edd1b1777fa2e0a827cf0e1be1f8fb8c9452424a165965968e4d10e5533dde74934ee171c89b8d64bda0f3235ba528968574e3def2e4b3e37ddd8adc582e982ecc6811084280721c0dfbb3d451e3ead7c2260991329b791d430243f0d29fcced5196d2bb3b678f8027138b4e3b5c423af88717a47047e2fcc6db5e787ed34472bc702ba78a09bac12639d2a074b038a9009020a6be96767ecdc03b5f1b820f198419f00aecc807ed74c04fbeaa214b68c4309b2ac3d22e850ad951920787776dcc4e287f393fb61508e3277be7d2e311a74b78584635d2bbadc023f8bc8cbb992a3487f3db55e5c8e3f2009b2904d8931a6c64ec9f64fef08f9771a39e5f7c39299184f2b2a704c285b866c8bcdc9d2b503becfb527555e3dcf10987ea0a94d32556559152a92c2c76305e1eb957373d893615a67cb63b554b9c47416395154bdb927dbcf3300a1a1816ca22b24cf5065724dc76bc86f6e75e5d290784924c845082f526aef8b9b5ff0a7615c99555febe07a988ab1348dde49f48ab5bb92097bf8dfbbe12bfa4b6dbfbfd4943f98e6d38aee22419c5816d91eeb4ab15b60f2fec04ac324d047f2e7121ef707d64dce95c66d63572c7e5d18b1555097e306d4d7add2d7096fdc13895ccb1509c731f1e1ab5257d52c0ca79be8497657358ab44c3eb42f45d791ce31155f9c9667e66a2650431144270df0ef7f272183de116b44ad5094d95f9d185e42bb060f8f879e15ce4327c003be6b99d2e5c0da9e262833085cdfe2df1f15c376b8ed988783153067e8c3a37a18b5c185c6ac639a3574e8dd2fe7867bb8d435497516d349530b9cfc5e264e67f195be3025938247cdfe2d8089c5b199d2f1db76d780a00801ee0d693cd0c7f138f470310f0ca53a70ae84ca07871233977057ed7c3a3518350a60ca26ceda2c5a3219366d85678dc275bd549b625a48ce18f6844c3058eff8dd255f595dfcdc721c331b412c10f4a512d802e22129c01480ce416639065c16b65d592819db779f98814f3452f23e1e6db8f465caf860c82f0b291240b16ac02acd4e392018bd3f8eaa44cb4144b7598eabc550e1ddd495d54ce46b11c39894adbe4e500cc1fc47fdc5e35beb7e87065453084636bbbb651ef9cc5aa44e08cf40acea9de1434ffac9f1d5a644b6643115b888e72688f1c6a6e4e18f894ca113671bbf1bf9edc65ac1cdbc53befcdb0cf5a4b54b7940beb419e134acb1514c2a7301ec404eed16e800b0fc0f46315945444362b241fb5ac400577622eaa228be5931f6246f5285f8ec2a2c518273967ce2b38895f5f1dade0bb385e888ba26de27f80b1c073ab9a7340ec914b4797da84de554b1b43d7877d21cda8cadb576548103529b7ce25e4df2dac2cc2be4986582af3d050945d5b2fd583113c8929b24e1e8a716a7674087a13de673c3ac126dbeeb18116df050a02690b93bd3279285ff551938b80e5c21ae86a234f304da7d7c4b9115697c9e1fc14a910865a2b088f80fb5602b62c852f0f73342b1e9d8cd1b8f6109d3b8e51e3bef41724cacacce6775fb9a3b4d86f2a6261c1313675e0c68147c43e5598aeeb90488b2533e746912b3e7dd1b7d0f2a4dfcd705875f87745d8b6ebc231dfc2cbb8769d9a7ddb46e75bc3c3655cc141085862e128684d7ada72661ddaaeb0b5a2e259f4334cbc6a209ef11bee46de3708c3be9197ad078250ba881c0dd910dab82bad659c4bc8b6bb5a7123579b5767ce8032be731d83624d95b0ae9bdb079cea5d046fcf14429a2c65cd5fbdf359007dc33b5c67b565510e236740970f025697e258a26cca394ff931e34661e4a727ce341e1d55cd7ccb56df2474a527822ecffeffcdb4b4f1b80cac573bae0d10c3691007ee40aa3b12e41ec6570588c3af76e2a0983f41ca9f39a59b8812290f873b870ba92c704062b7a2cd6dd781fe36c3f9a813dd6bbfbfbbaa6647915e19178b49c506430da44d8bc2b0a2e98d6e21e141a478b43802ed8214819400f6318c61e813dae900c0eda170e9352cf5782cb057715a76f27a84eb956426bcb7145cd27da795e400fd8bc46cf3a9aff9311fd61c0e89a7ac6faeb26e7e8d0ade4791e6c7eca2c8b1e01dfaf28696420d47976c46e2616896a868f66df7f7a3c33a965f8d231c97097b10c665ee2dbedba139bbb621c3e70a2247d18ed527b442aa76968474a3ea03a5be2d4e7cff8a396b24499cdde8f8ad32c4db8c08db42cb0c625b7c2bc18cfd3a4ae3ff7ca8cf0b693f98ed224478695d8a306e9030ce7a913dc25549dcd20168a68eea27b267173412f1461bc8dba5999f58083558eebd44191e2d1cf8432a12968474bbbdde5b40152b345a4c616e1533cd8618b25916139e315575d09651c4d3a578251fcf8e47154a560037a5b4cca764012a8dea0564a38e1118a290ebd340053359a37b5465ffec1a09cdc8cb468fb703eac46180ecd6ffa38c66ffa023b587685a40bfeaa112495d658620a3f7c878bdb6ecf2034e4ff0ce280bc9b61082da5c8ad1a55478dc78b981566953739cafb780dc749c13a9fd7947b970ee8c720159aae300c51d62a244e911efb2ba60189e71d39ae2a03aa47b5a50067c107f5a8b3aa3b64a68f7c05fecfbd6cf9867afb15e3a9b280ce602d3498af9ddbb6bae98ae2740d0d029201af7b6a70c5061d7723088960f3f02460f6471955770ef7f7c7ddb8070eb14181efbd0ad34e31e43dbaf6acaef1eaa2532239af69d80f95293de1e3b1dc58980d1edb51161f1fe7841003748de16839d55ff2ca8e5178349316e010fe83b279c3724f50e50ab8eea6c7beb01946bf149b2214cdb6c19d25168a5d451cfa1cd17a41c419e018da6c908fc5a37f07603fb5d384f86e091993862f3e2e16a30fea761299efd433afb173f824789bab04b5a204e655666df3709a26030d6a5bbe9c50b03ef65e09d3fe180e6b5c24856032a8ee7b2c2cfd0b4539f34b4e1e17a0c8187ddc2e6aee406ed5183de67f0e0c784e37c830452e05ecc9ede1c163c62c79d249731941c258cf983c0626aea4767ad95bee1b94cca7daf5371bbc10233889e23f85c1fc71c4c7b8857c0a68dd2469043e088cee77fc71dbf837e76342eb69747779b045327b167e2c4ac98cc5a88dfcaaebfb6790780e8a0f3684f7cf007c9b81edad241846f8c7f8a5dbf53025955b92f672020e73003a629594642a99625a4fe83bbf0a0e659691affea646dd3228d74b29363d4321eee28cbe97f05c15afb95dd035388f59a62f0dde7450ebe10bf04ba8ad0833f2f71e2fe9befba9d6663ed17319df6963af367c1b0c27cbb8d5271028f899524a73bc1a6a0635aa0618f140756ba974872098c26b82f316adba992a679f631bf6377232932e0cd5980053ae6d677ee8f154c7a52b829e65f40e5de081f218f27e6a467c127884de9ac97a6ae9473ade31c21270b9d613cd804f974fed92f4776d8b62c0e0a0f8492a67c3eb657664f2e787bfa1fa7821b318ae1d17079bfbed54a160a047d69f57ba3d68055cb07dbdff219288a778e7f37162d2ab332423104eb095b0bcdaa671a785189dc9c043f2a0bb311f44864eccfc9483ef5203ceaf27a3787561cafeeeea40f43851484614d741e2570aaff02a21759273dc21ad7d1270964ffc5226daaf535b5130a355f6eacaa5ce49206e0045087b0c8834a6f47ffe0c7b8915290945fa99310031c2f5f2da396f896166755fd99df9be8e753d0ab65eb6d91e82ed8cc044890eab3f249fee6bfade3e32b287acf6a914db6aef832767d51f87413ac6b44d443e8bd6070a7cd5a29097e8c77779349697d6428008250d508ed186ebd5fe1bc5bacbd3534c85b9493feebd6087623ff430837c41bcd5698115c094ab8562112668d9e4cb8590a7975eec5d1a31161b83aa195848a3264d5ea8cab171d5b0e8a497b4e8fad8c43ca0298a0f1f75e58d958c41ccb5de98f328828771b831740e4424847ed52d53ee420227738cdb952cff9ff1c044aed678774ed9b07cc5b3534f97f47896351b2662452c77cc363259dd633f1656314d504a2263c9c05a84f0a6bb92430c8b119dfb21dff25b221d35c2674d84f4e4d556f80789cd8c1519276e2ee70ddee339b43d2b39fa63e97d1bfd2616df321bbe0e45a9c9e81918c67e69c2e434de9eb99372d14742fa1ffdd4664cd7ee207ac6873fa8d641eed078c9ba02315ad9b090e778e381f834a67f2883552de7d99acec84c773cb45570eb009d6baf7c7da6848a9503b43698b9d342a32881cc5325cc0cca0fd3cae7d3ab70f4cae4f79a0ac5a70724cc9831b16d00d6378c2c46763b951d5111d3398749d0e31bf134a43d8e4afd90a44a9a565e9b15d02071d3869df43628a18f3dba439a89b01dafbf76316f2fe036cd21df986e9663cb14b756dacbd34ceb9e2f414ed013ada721b711626ca4c07120b664ee6442ba7a416ab00396ffb610bedcac2645870abd625c36c73c619807a3ff01a79d038fcc64204f8989a09f521499c744de4c907c0dc9fcc17c476607ca2d1193c306ae69e8b4cc9b351c980a4098e4b92ed4a81fddd0fab42610a10f4ba1c86e627848777e65801f57c097666f7504faf8272e845277c7f6b9968aa9ff3bf277841568d69eff950e599a2c44eefd4cf727813efe88d6dffb6e9d61f89b4261184208db1d74ffcf182635d8bbb87e3fdd32bb921aef78dc2f84d4fc0e825a9bb74e01768832e179a71f50be355fcffc777503efc4ebf7643e25432275bbb043d5d744a3085652e5b38007faa1a8a2d2c84cf64b4cb5ed8b838ae56d5c0b1404ded45c556a6d0050148aef2c4229523a633298d7295f7ece9e55992739ad9a71d925e588db021132bf4e8", 0x1000}], 0xfffffffffffffda) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000100)={0x80000000, 0x9, 0x0, 0x8, 0x81}) 21:31:45 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x500}) 21:31:45 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x14, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 739.515491] hfs: unable to load codepage "i [ 739.515491] o8859-4" [ 739.522139] hfs: unable to parse mount options [ 739.538776] usb usb9: usbfs: process 17326 (syz-executor4) did not claim interface 0 before use [ 739.637675] usb usb9: usbfs: process 17344 (syz-executor1) did not claim interface 0 before use [ 739.641771] hfs: unable to parse mount options [ 739.661210] hfs: unable to load codepage "i [ 739.661210] o8859-4" [ 739.667810] hfs: unable to parse mount options [ 739.677797] usb usb9: check_ctrlrecip: process 17349 (syz-executor7) requesting ep 01 but needs 81 [ 739.687175] usb usb9: usbfs: process 17349 (syz-executor7) did not claim interface 0 before use 21:31:45 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x600000000000000}) 21:31:45 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000000)={0x7, 0x3, 0x400, 0x0, 0x1b}) 21:31:45 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x7}) 21:31:45 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'i*o8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 739.784715] hfs: unable to parse mount options 21:31:45 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0xffffff7f}) 21:31:45 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10383, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) prctl$setfpexc(0xc, 0x3) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:46 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x1d, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 739.880439] usb usb9: usbfs: process 17366 (syz-executor4) did not claim interface 0 before use [ 739.904632] usb usb9: usbfs: process 17374 (syz-executor1) did not claim interface 0 before use 21:31:46 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x6}) [ 739.974647] hfs: unable to load codepage "i*o8859-4" [ 739.980071] hfs: unable to parse mount options [ 739.980917] usb usb9: check_ctrlrecip: process 17382 (syz-executor7) requesting ep 01 but needs 81 [ 739.993961] usb usb9: usbfs: process 17382 (syz-executor7) did not claim interface 0 before use 21:31:46 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x6, 0x14002) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)={0x0, 0x59, "0a69109b7c0e05efd585087e989f47a47947bfc11b053f335ac54b9b0e2f5e965f43c1314e4ce09934f2a9d85bc2801b360f83516ed6d9f6bc4daa2299aa261288cbab4d482d36a1fd39e848277932c291090dc073085826dd"}, &(0x7f0000000100)=0x61) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000140)={r1, @in={{0x2, 0x4e23, @broadcast}}, [0x100000000, 0x8, 0xfffffffffffffffb, 0x200, 0x11, 0xdf, 0x20, 0xa5, 0x2, 0x0, 0x101, 0x8, 0x7, 0x1f, 0x1]}, &(0x7f0000000280)=0x100) r3 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000002c0)={r2, 0x0, 0x7, 0x4, 0x1f, 0xf0, 0x2, 0x22, {r1, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x16}}}, 0x0, 0x5, 0x7, 0x1, 0x7}}, &(0x7f0000000380)=0xb0) ioctl$FS_IOC_FSGETXATTR(r3, 0x4004550d, &(0x7f0000000240)) [ 740.061331] hfs: unable to parse mount options [ 740.082266] hfs: unable to load codepage "i*o8859-4" [ 740.087644] hfs: unable to parse mount options 21:31:46 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x6000000}) 21:31:46 executing program 6: r0 = semget(0x2, 0x0, 0x40) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000100)=[0x1, 0x7, 0x1ff, 0x0]) io_setup(0x6, &(0x7f0000000140)=0x0) accept$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @multicast2}, &(0x7f0000000200)=0x10) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x2000, 0x0) io_cancel(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xb, 0x8, r2, &(0x7f0000000280)="a1706a7f29771497c3d0bf4837d959ac2958158b3e2eebe7d7a0e2", 0x1b, 0x100000002, 0x0, 0x1, r2}, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000500)=ANY=[@ANYBLOB="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"]) r4 = dup(r3) r5 = open(&(0x7f0000000240)='./file0\x00', 0x400080, 0x0) read(r4, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r5, 0x80080) r6 = socket$vsock_dgram(0x28, 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000400)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6b}}, 0x30) sendfile(r6, r5, &(0x7f00000003c0)=0x3, 0x2008000fffffffe) pipe2$9p(&(0x7f0000000380), 0x800) 21:31:46 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000080)=0x3ff, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:46 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iio8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:46 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, '\nso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:46 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x2000000}) [ 740.215749] usb usb9: usbfs: process 17401 (syz-executor1) did not claim interface 0 before use [ 740.236169] usb usb9: usbfs: process 17406 (syz-executor4) did not claim interface 0 before use 21:31:46 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000140)) accept(r0, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000100)=0x80) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000000)=0x1, 0x4) 21:31:46 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x6800}) [ 740.372917] usb usb9: check_ctrlrecip: process 17426 (syz-executor7) requesting ep 01 but needs 81 [ 740.373454] hfs: unable to load codepage " [ 740.373454] so8859-4" [ 740.382192] usb usb9: usbfs: process 17426 (syz-executor7) did not claim interface 0 before use [ 740.388678] hfs: unable to parse mount options [ 740.399156] hfs: unable to load codepage "iio8859-4" [ 740.407430] hfs: unable to parse mount options 21:31:46 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x3f00}) 21:31:46 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000080), 0x4) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f00000000c0)=0x10, 0x4) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 740.508435] hfs: unable to load codepage " [ 740.508435] so8859-4" [ 740.515135] hfs: unable to parse mount options [ 740.521499] hfs: unable to load codepage "iio8859-4" [ 740.526735] hfs: unable to parse mount options 21:31:46 executing program 6: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$llc(r0, &(0x7f00000003c0)={0x1a, 0x7, 0x5, 0xf0, 0x2, 0x40, @random="a2febd245759"}, 0x10) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = dup(r1) r3 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) recvfrom$llc(r3, &(0x7f00000001c0)=""/236, 0xec, 0x12060, 0x0, 0x0) read(r2, &(0x7f0000000900)=""/4096, 0x1000) setsockopt$inet6_udp_encap(r3, 0x11, 0x64, &(0x7f0000000380)=0x7, 0x4) socket$packet(0x11, 0x3, 0x300) ftruncate(r3, 0xad) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000100)) recvfrom$packet(r1, &(0x7f0000000340)=""/48, 0x30, 0x10000, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) recvfrom$llc(r2, &(0x7f00000002c0)=""/91, 0x5b, 0x0, &(0x7f0000000140)={0x1a, 0x308, 0x20, 0x3, 0x9de, 0x4, @remote}, 0x10) sendfile(r2, r3, &(0x7f0000d83ff8), 0x2008000fffffffe) 21:31:46 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, '%so8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:46 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x7a00}) 21:31:46 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'i+o8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 740.788162] usb usb9: usbfs: process 17467 (syz-executor4) did not claim interface 0 before use [ 740.798684] usb usb9: check_ctrlrecip: process 17469 (syz-executor7) requesting ep 01 but needs 81 [ 740.807888] usb usb9: usbfs: process 17469 (syz-executor7) did not claim interface 0 before use [ 740.817145] usb usb9: usbfs: process 17465 (syz-executor1) did not claim interface 0 before use [ 740.844279] hfs: unable to load codepage "i+o8859-4" [ 740.849618] hfs: unable to parse mount options [ 740.857254] hfs: unable to load codepage "%so8859-4" [ 740.862593] hfs: unable to parse mount options 21:31:47 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = fcntl$getown(r0, 0x9) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000140)={{{@in=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getpid() r5 = syz_open_procfs(r1, &(0x7f0000000700)='comm\x00') getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0}, &(0x7f00000003c0)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0, 0x0}, &(0x7f0000000440)=0xc) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000480)=0x0) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0, 0x0}, &(0x7f00000005c0)=0xc) sendmsg$unix(r0, &(0x7f00000006c0)={&(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000100)=[{&(0x7f0000000080)="06f5badf59cea899b2149abd73878808b8841ae0bb060e336d90725d968d7a", 0x1f}], 0x1, &(0x7f0000000600)=[@rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r1, r2, r3}, @cred={0x20, 0x1, 0x2, r4, r6, r7}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0, r0]}], 0xc0, 0x800}, 0x4000) fcntl$F_SET_RW_HINT(r5, 0x40c, &(0x7f00000008c0)=0x3) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000740)={0x0, @in6={{0xa, 0x4e21, 0x400, @loopback, 0x9}}, 0x3f, 0x2}, &(0x7f0000000800)=0x90) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000000840)={0xa2, 0x8, 0x6, 0x0, r11}, &(0x7f0000000880)=0x10) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) 21:31:47 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x4c00000000000000}) 21:31:47 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f00000000c0)=r1) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:47 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x3f00}) [ 740.937735] hfs: unable to load codepage "%so8859-4" [ 740.942980] hfs: unable to parse mount options [ 740.952279] hfs: unable to load codepage "i+o8859-4" [ 740.957528] hfs: unable to parse mount options 21:31:47 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x7400}) 21:31:47 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r2, 0x80080) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) [ 741.064708] usb usb9: usbfs: process 17498 (syz-executor4) did not claim interface 0 before use 21:31:47 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iuo8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:47 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'i0o8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:47 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x10000) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000080)=0x78) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e20, 0x3, @empty, 0x7f}], 0x1c) fcntl$dupfd(r0, 0x406, r0) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000040)={0x0, 0x0, 0x3}) [ 741.149333] usb usb9: check_ctrlrecip: process 17507 (syz-executor7) requesting ep 01 but needs 81 [ 741.158595] usb usb9: usbfs: process 17507 (syz-executor7) did not claim interface 0 before use [ 741.167695] usb usb9: usbfs: process 17506 (syz-executor1) did not claim interface 0 before use 21:31:47 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x2}) 21:31:47 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x68}) 21:31:47 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000700)={0x0, @in={{0x2, 0x4e20, @multicast2}}, 0x7, 0x7, 0x101, 0x9, 0x401}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000800)={r1, @in6={{0xa, 0x4e23, 0x3, @dev={0xfe, 0x80, [], 0x10}, 0x3592}}, 0x9, 0x4, 0x7, 0xffffffff00000001, 0xe9}, &(0x7f0000000140)=0x98) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r2, 0x400454ce, r4) recvfrom$inet6(r2, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r2, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) r7 = openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r8, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r6, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) ioctl$VHOST_NET_SET_BACKEND(r7, 0x4008af30, &(0x7f0000000280)={0x1, r2}) socketpair$inet6(0xa, 0x7, 0x4c1, &(0x7f00000002c0)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) get_thread_area(&(0x7f0000000080)={0x4, 0x20000000, 0x4000, 0x0, 0xd9, 0x100, 0x4, 0x5, 0x5, 0x1cb}) [ 741.291980] hfs: unable to load codepage "i0o8859-4" [ 741.297235] hfs: unable to parse mount options 21:31:47 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x5}) 21:31:47 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000280)=""/4096) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) 21:31:47 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000140)) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000000900)=""/4096, 0x1000) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000240)=0x3, 0x4) ftruncate(r2, 0x80080) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) [ 741.376858] usb usb9: usbfs: process 17537 (syz-executor4) did not claim interface 0 before use [ 741.386815] hfs: unable to load codepage "iuo8859-4" [ 741.392151] hfs: unable to parse mount options [ 741.399468] usb usb9: usbfs: process 17538 (syz-executor1) did not claim interface 0 before use [ 741.408909] hfs: unable to load codepage "i0o8859-4" [ 741.414374] hfs: unable to parse mount options [ 741.514593] hfs: unable to load codepage "iuo8859-4" [ 741.519902] hfs: unable to parse mount options [ 741.553877] usb usb9: check_ctrlrecip: process 17555 (syz-executor7) requesting ep 01 but needs 81 21:31:47 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'ido8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:47 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x2000000000000000}) [ 741.563100] usb usb9: usbfs: process 17555 (syz-executor7) did not claim interface 0 before use 21:31:47 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x4800}) 21:31:47 executing program 0: openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0xdaafc1d9088602b5, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x4004550d, &(0x7f0000000240)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000040)=0x40, 0x4) 21:31:47 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'ixo8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 741.645099] usb usb9: usbfs: process 17564 (syz-executor4) did not claim interface 0 before use 21:31:47 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000280)=0x3ff, 0xffffffffffffff90) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x4000, 0xa) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f00000000c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f0000000040)) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:47 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x2000000000000000}) [ 741.738744] hfs: unable to load codepage "ido8859-4" [ 741.744062] hfs: unable to parse mount options 21:31:47 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x100000000000000}) [ 741.800625] usb usb9: usbfs: process 17583 (syz-executor1) did not claim interface 0 before use 21:31:48 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000000)={0x7, 0x10001}) [ 741.847513] hfs: unable to load codepage "ido8859-4" [ 741.852751] hfs: unable to parse mount options [ 741.870870] hfs: unable to load codepage "ixo8859-4" [ 741.876123] hfs: unable to parse mount options [ 741.910363] usb usb9: check_ctrlrecip: process 17594 (syz-executor7) requesting ep 01 but needs 81 [ 741.919666] usb usb9: usbfs: process 17594 (syz-executor7) did not claim interface 0 before use [ 741.933725] usb usb9: usbfs: process 17598 (syz-executor4) did not claim interface 0 before use 21:31:48 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x6000}) 21:31:48 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iio8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 741.979525] hfs: unable to load codepage "ixo8859-4" [ 741.984758] hfs: unable to parse mount options 21:31:48 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'i%o8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:48 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r2) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000080)={0x0, 0x3}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000140)={r3, 0x80}, &(0x7f0000000280)=0x8) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:48 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x100000000000000}) 21:31:48 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x4000000}) [ 742.120404] usb usb9: usbfs: process 17617 (syz-executor1) did not claim interface 0 before use 21:31:48 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0xac) 21:31:48 executing program 6: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r2 = dup(r1) r3 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r2, &(0x7f0000000900)=""/4096, 0x1000) sendfile(r0, r2, 0x0, 0x6) ftruncate(r0, 0x8000000000000005) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) sendfile(r2, r3, &(0x7f0000d83ff8), 0x2008000fffffffe) [ 742.180743] hfs: unable to load codepage "iio8859-4" [ 742.185973] hfs: unable to parse mount options 21:31:48 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x4c00}) [ 742.254545] usb usb9: usbfs: process 17634 (syz-executor4) did not claim interface 0 before use [ 742.264142] usb usb9: check_ctrlrecip: process 17636 (syz-executor7) requesting ep 01 but needs 81 [ 742.273415] usb usb9: usbfs: process 17636 (syz-executor7) did not claim interface 0 before use [ 742.289189] hfs: unable to load codepage "i%o8859-4" [ 742.294384] hfs: unable to parse mount options 21:31:48 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'ipo8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:48 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000100)=""/157, &(0x7f0000000080)=0x9d) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x400) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f00000001c0)) 21:31:48 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x1, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x121100, 0x0) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:48 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x74000000}) [ 742.414576] usb usb9: usbfs: process 17649 (syz-executor1) did not claim interface 0 before use 21:31:48 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x4c000000}) [ 742.457281] hfs: unable to load codepage "i%o8859-4" [ 742.462547] hfs: unable to parse mount options [ 742.517058] usb usb9: usbfs: process 17667 (syz-executor4) did not claim interface 0 before use 21:31:48 executing program 6: r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x100, 0x200) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=0x0, &(0x7f00000001c0)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000200)={r1, @in6={{0xa, 0x4e22, 0x101, @remote, 0x3b}}, 0xfff, 0x40, 0x5, 0x9, 0xfffffffffffff801}, &(0x7f00000002c0)=0x98) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000340)={r1, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}}, 0x4, 0x8, 0x401, 0xfffffffffffffffe, 0x1}, &(0x7f0000000400)=0x98) r3 = dup(r2) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r3, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r4, 0x80080) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) ioctl$KVM_SMI(r2, 0xaeb7) read$FUSE(r4, &(0x7f0000001900), 0x1000) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000440)={0x0, 0x5}) getsockopt$inet_tcp_int(r4, 0x6, 0xc5a4f1b7ff315639, &(0x7f00000004c0), &(0x7f0000000500)=0x4) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) setsockopt$sock_timeval(r2, 0x1, 0x0, &(0x7f0000000480)={r5, r6/1000+10000}, 0x10) 21:31:48 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x6000000}) 21:31:48 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'i-o8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 742.585618] hfs: unable to load codepage "ipo8859-4" [ 742.590870] hfs: unable to parse mount options 21:31:48 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) exit(0xe7) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) [ 742.656905] usb usb9: check_ctrlrecip: process 17677 (syz-executor7) requesting ep 01 but needs 81 [ 742.666148] usb usb9: usbfs: process 17677 (syz-executor7) did not claim interface 0 before use 21:31:48 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x7}) 21:31:48 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000080)={0xfffffffffffffffc, 0x2, 0x7fffffff, 0x800, 0x0}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000140)=r5, 0x4) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r7, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r6, &(0x7f0000000140), 0x4000}]) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000280)=""/39) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000800)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f00000004c0)=0xe8) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000005c0)=0x0) r10 = gettid() sendmsg$nl_generic(r1, &(0x7f0000000680)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10008}, 0xc, &(0x7f0000000640)={&(0x7f0000001f00)=ANY=[@ANYBLOB="d81500001f00020029bd7000ffdbdf25030000001400200008007600", @ANYRES32=r1, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="cf56cda77a8e64f2f87a0711ace2f43abb2a40f3b0cc1b6ee3275a434a7e23f2af19fb328849473ffd3f81975783df1c507c0dc95260c95f6f3b433f4029bf6f2db45a9fac690f387e8c84cf36cdf2ca14621a90ef79dec5d2abfed267b2411c4271a6ca67e9218fabd0f424799c5f63eb57eba3de2af432dd7fe896d6c69073ac380ce28a92f2de7d852f88b2a2a43921633e81266d9f5937d32b17d2024413be011146693342c4c1c6adef7d12d9eda52e0439147b4c3434751d8dda43cd494f640cf74234805e4ad3815fed667e5952f8272ef70d6fdb95a2e1569ce4dcd9714c66ceab4dd5e02fe0a46a305c9777c50400570008009300", @ANYRES32=r8, @ANYBLOB="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", @ANYRES32=r9, @ANYBLOB="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", @ANYRES32=r10, @ANYBLOB="100040002f6465762f617564696f00007c00800010005a002f6465762f617564696f00002af97b72460fa20a2d32da478f92dbced238c93804af73c0369d743dea24338eb78bee9b08b4d6f24da7f9d87ed02e0aabdc1dfd2c601aeb085ef37c58d8ee90e98f841765f4f8da8400148c2efecea00de1cff12319aa22ca141d38644202998c282112b2c1000000"], 0x15d8}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:48 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'ilo8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 742.750909] usb usb9: usbfs: process 17692 (syz-executor1) did not claim interface 0 before use [ 742.811326] usb usb9: usbfs: process 17696 (syz-executor4) did not claim interface 0 before use 21:31:49 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x74}) 21:31:49 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x6c00}) [ 742.871648] hfs: unable to load codepage "i-o8859-4" [ 742.876927] hfs: unable to parse mount options [ 742.922797] hfs: unable to load codepage "ilo8859-4" [ 742.928123] hfs: unable to parse mount options 21:31:49 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x7a00000000000000}) [ 742.964362] hfs: unable to load codepage "i-o8859-4" [ 742.969588] hfs: unable to parse mount options [ 743.007439] usb usb9: check_ctrlrecip: process 17719 (syz-executor7) requesting ep 01 but needs 81 [ 743.016811] usb usb9: usbfs: process 17719 (syz-executor7) did not claim interface 0 before use [ 743.043215] usb usb9: usbfs: process 17723 (syz-executor1) did not claim interface 0 before use 21:31:49 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000080)={0x8, 0x9}) 21:31:49 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iXo8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 743.083325] hfs: unable to load codepage "ilo8859-4" [ 743.084988] usb usb9: usbfs: process 17728 (syz-executor4) did not claim interface 0 before use [ 743.088565] hfs: unable to parse mount options 21:31:49 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x4c000000}) 21:31:49 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x7a}) 21:31:49 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r2, 0x80080) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) sendfile(r1, r2, &(0x7f0000000100), 0x2008000fffffffe) 21:31:49 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'i#o8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 743.260181] usb usb9: usbfs: process 17744 (syz-executor1) did not claim interface 0 before use [ 743.283099] hfs: unable to load codepage "iXo8859-4" [ 743.288293] hfs: unable to parse mount options [ 743.295142] usb usb9: check_ctrlrecip: process 17747 (syz-executor7) requesting ep 01 but needs 81 21:31:49 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x5000000}) [ 743.304345] usb usb9: usbfs: process 17747 (syz-executor7) did not claim interface 0 before use 21:31:49 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x700}) 21:31:49 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000080)) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) r6 = openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) setsockopt$inet6_group_source_req(r6, 0x29, 0x2b, &(0x7f0000000800)={0x0, {{0xa, 0x4e23, 0x1ff, @mcast1, 0x7}}, {{0xa, 0x4e21, 0x2, @empty, 0xfffffffffffffff7}}}, 0x108) io_submit(r7, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 743.380137] usb usb9: usbfs: process 17765 (syz-executor4) did not claim interface 0 before use [ 743.391391] hfs: unable to load codepage "iXo8859-4" [ 743.396612] hfs: unable to parse mount options [ 743.417682] hfs: unable to load codepage "i#o8859-4" [ 743.422929] hfs: unable to parse mount options [ 743.515112] usb usb9: usbfs: process 17772 (syz-executor1) did not claim interface 0 before use [ 743.537317] hfs: unable to load codepage "i#o8859-4" [ 743.542505] hfs: unable to parse mount options 21:31:49 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x4}) 21:31:49 executing program 0: ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x4004550d, &(0x7f0000000240)) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x402600, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x10001) r2 = semget(0x0, 0x4, 0x10) semctl$IPC_RMID(r2, 0x0, 0x0) accept4$packet(r0, 0x0, &(0x7f0000000140), 0x34adff29cfeb3161) 21:31:49 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'ipo8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:49 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0xa000000}) [ 743.663690] usb usb9: check_ctrlrecip: process 17791 (syz-executor7) requesting ep 01 but needs 81 [ 743.672924] usb usb9: usbfs: process 17791 (syz-executor7) did not claim interface 0 before use 21:31:49 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps\x00') sendfile(r0, r1, &(0x7f0000000000), 0xf4ad) 21:31:49 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'i*o8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:49 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:49 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x6c}) [ 743.723380] hfs: unable to load codepage "ipo8859-4" [ 743.728565] hfs: unable to parse mount options [ 743.748985] usb usb9: usbfs: process 17797 (syz-executor4) did not claim interface 0 before use 21:31:49 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) [ 743.829432] hfs: unable to load codepage "ipo8859-4" [ 743.834730] hfs: unable to parse mount options [ 743.868124] usb usb9: usbfs: process 17812 (syz-executor1) did not claim interface 0 before use 21:31:50 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x2}) 21:31:50 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x500}) 21:31:50 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'ico8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:50 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x100000000000000}) [ 743.977174] hfs: unable to load codepage "i*o8859-4" [ 743.982482] hfs: unable to parse mount options 21:31:50 executing program 6: 21:31:50 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x8000) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x6, 0x800) [ 744.053403] hfs: unable to load codepage "i*o8859-4" [ 744.058715] hfs: unable to parse mount options [ 744.071508] usb usb9: usbfs: process 17833 (syz-executor4) did not claim interface 0 before use [ 744.084161] usb usb9: check_ctrlrecip: process 17837 (syz-executor7) requesting ep 01 but needs 81 [ 744.093354] usb usb9: usbfs: process 17837 (syz-executor7) did not claim interface 0 before use 21:31:50 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000080)={0x0, 0x25, "e2e769c4a005e702cd829953026d587a88c7785743ae03fe3b42bd0e98cd9f19f97bf182ac"}, &(0x7f00000000c0)=0x2d) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x80000000, 0x5, 0x8, 0xb3, 0x5, 0x0, 0x2, 0x5, r4}, &(0x7f0000000280)=0x20) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r7, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r6, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:50 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'ixo8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 744.160690] usb usb9: usbfs: process 17845 (syz-executor1) did not claim interface 0 before use [ 744.192824] hfs: unable to load codepage "ico8859-4" [ 744.198070] hfs: unable to parse mount options 21:31:50 executing program 6: 21:31:50 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x48}) 21:31:50 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x4c00000000000000}) [ 744.299486] hfs: unable to load codepage "ico8859-4" [ 744.304734] hfs: unable to parse mount options 21:31:50 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0xfffffffffffffffd) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000000)={{0xfffffffffffffff7, 0xfffffffffffffffb, 0x1, 0x4, 0x2, 0x5}, 0x8}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)=0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000200)={0x3, &(0x7f0000000080)=[{0xffffffff00000001, 0x4}, {0x1, 0x1f}, {0x1, 0xb735}]}) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000340)={0x5, 0x0, 0x7, 0x1, 0x400, 0xabcd, 0x0, 0x0, 0x5, 0x1ff}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x7, &(0x7f0000000100)=""/197) getpeername$inet(r0, &(0x7f0000000280)={0x2, 0x0, @multicast1}, &(0x7f00000002c0)=0x10) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000300)=0x6) 21:31:50 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'ido8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:50 executing program 6: 21:31:50 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x7000000}) [ 744.408480] usb usb9: usbfs: process 17871 (syz-executor4) did not claim interface 0 before use 21:31:50 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pwrite64(r1, &(0x7f0000000040)="2f289715e75a7b46019fdedc9941c3e153d6e27a5b4eee40ca17", 0x1a, 0x60) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f00000000c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6(0xa, 0x5, 0x3) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 744.467157] hfs: unable to load codepage "ixo8859-4" [ 744.471087] usb usb9: check_ctrlrecip: process 17877 (syz-executor7) requesting ep 01 but needs 81 [ 744.472376] hfs: unable to parse mount options [ 744.481524] usb usb9: usbfs: process 17877 (syz-executor7) did not claim interface 0 before use 21:31:50 executing program 6: [ 744.572262] usb usb9: usbfs: process 17889 (syz-executor1) did not claim interface 0 before use [ 744.607621] hfs: unable to load codepage "ido8859-4" [ 744.612924] hfs: unable to parse mount options 21:31:50 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000000)={0x4, 0x3f, 0x1, 0x8000, 0x2f, 0x8000}) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) read$FUSE(r0, &(0x7f0000000280), 0x1000) 21:31:50 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x3f000000}) 21:31:50 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x60000000}) [ 744.652876] hfs: unable to load codepage "ixo8859-4" [ 744.658125] hfs: unable to parse mount options [ 744.742642] hfs: unable to load codepage "ido8859-4" [ 744.747856] hfs: unable to parse mount options 21:31:50 executing program 6: 21:31:50 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x2000}) [ 744.818661] usb usb9: usbfs: process 17916 (syz-executor1) did not claim interface 0 before use [ 744.830314] usb usb9: usbfs: process 17917 (syz-executor4) did not claim interface 0 before use 21:31:51 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'i+o8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:51 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x20) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)={0x0, 0x1eec}) 21:31:51 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'i#o8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:51 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x6000000}) [ 744.958230] usb usb9: check_ctrlrecip: process 17928 (syz-executor7) requesting ep 01 but needs 81 [ 744.967436] usb usb9: usbfs: process 17928 (syz-executor7) did not claim interface 0 before use 21:31:51 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000280)={0x7, &(0x7f0000000140)=[{0x4, 0x81, 0xfffffffffffffffd, 0xffffffff}, {0x7, 0x6, 0x1f, 0x8}, {0x100000000, 0x0, 0x100000001, 0x3a4b}, {0x100000001, 0x287b, 0x20, 0x4}, {0x200, 0x9437, 0x4, 0xfffffffffffffffd}, {0x40, 0x7f, 0x3, 0xffff}, {0x400, 0x6, 0x0, 0x9fd2}]}) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0xfffffffffffeffff, &(0x7f0000000080)) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r7, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r6, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f00000000c0)) 21:31:51 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x3}) 21:31:51 executing program 6: [ 745.080953] hfs: unable to load codepage "i+o8859-4" [ 745.086213] hfs: unable to parse mount options [ 745.107249] usb usb9: usbfs: process 17948 (syz-executor4) did not claim interface 0 before use 21:31:51 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) socket$kcm(0x29, 0x5, 0x0) [ 745.144261] usb usb9: usbfs: process 17954 (syz-executor1) did not claim interface 0 before use 21:31:51 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x6800000000000000}) 21:31:51 executing program 6: [ 745.203436] hfs: unable to load codepage "i+o8859-4" [ 745.208685] hfs: unable to parse mount options [ 745.229622] hfs: unable to load codepage "i#o8859-4" [ 745.234830] hfs: unable to parse mount options 21:31:51 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'ico8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:51 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x7a}) 21:31:51 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x4c000000}) 21:31:51 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) r6 = openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r6, &(0x7f0000000800)="acc748e3ce600cc6d4be46d7df3a8e5723f9254fc7e3dcd1a8b2e4a7eb65b9f9cfdab48632ff68a2d871ca75daa3bd35fd5ebb803f7c38fdadf76003ce7a16129f11bdb7cda1f1e0a404c0a53a6968e5feb9050ba6257c9281bf2cede76cc4b41571a8a151518c3400a7f65567a980b8a09968d95cea93e6e74afe8a8b558e12d0c47e04e36402a7988e5a36337bb7e75b8262efcf7a1c7c5d3a4fe9afac46f540c21dbd58abf630bcafb2c84ce2473408c6f49050092c8a785fc5e0b1f70250e575e94de8ec0b137bf0a24832e4b72861dbe19684f066be86f4e4da62c026"}, 0x10) io_submit(r7, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) ioctl$TIOCLINUX2(r6, 0x541c, &(0x7f0000000080)={0x2, 0x800, 0x81, 0x4, 0x3, 0x4f}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 745.359632] hfs: unable to load codepage "i#o8859-4" [ 745.364855] hfs: unable to parse mount options 21:31:51 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'vla\x00', 0x2000000000000004}) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000040)={0x7, 0xfff}, 0x2) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) [ 745.401420] usb usb9: check_ctrlrecip: process 17975 (syz-executor7) requesting ep 01 but needs 81 [ 745.410720] usb usb9: usbfs: process 17975 (syz-executor7) did not claim interface 0 before use 21:31:51 executing program 6: 21:31:51 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'i0o8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 745.488675] usb usb9: usbfs: process 17987 (syz-executor1) did not claim interface 0 before use [ 745.508203] usb usb9: usbfs: process 17991 (syz-executor4) did not claim interface 0 before use [ 745.583557] hfs: unable to load codepage "ico8859-4" [ 745.589200] hfs: unable to parse mount options 21:31:51 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x3f00000000000000}) 21:31:51 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x1f, 0x82080) fcntl$setflags(r0, 0x2, 0x1) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) recvmmsg(r1, &(0x7f0000000900)=[{{&(0x7f0000000100)=@sco, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000180)=""/40, 0x28}, {&(0x7f00000001c0)=""/59, 0x3b}, {&(0x7f0000000280)=""/169, 0xa9}, {&(0x7f0000000340)=""/175, 0xaf}, {&(0x7f0000000400)=""/159, 0x9f}], 0x5, 0x0, 0x0, 0x1}, 0x234}, {{&(0x7f0000000540)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000005c0)=""/172, 0xac}, {&(0x7f0000000680)=""/248, 0xf8}, {&(0x7f0000000200)=""/38, 0x26}, {&(0x7f0000000780)=""/26, 0x1a}], 0x4, &(0x7f0000000800)=""/199, 0xc7, 0x7fffffff}, 0x2}], 0x2, 0x40000060, &(0x7f0000000980)={0x77359400}) bind$can_raw(r1, &(0x7f00000009c0)={0x1d, r2}, 0x10) ioctl$FS_IOC_FSGETXATTR(r1, 0x4004550d, &(0x7f0000000240)) 21:31:51 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x6c000000}) 21:31:51 executing program 6: 21:31:51 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x300000000000000}) 21:31:51 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000980)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x3f, &(0x7f00000002c0)=0x81, 0x4) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) r7 = openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0xfffffffffffffffd, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r8, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r6, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) io_setup(0x7, &(0x7f0000000780)) getsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000700), &(0x7f0000000740)=0x4) getsockopt$inet_sctp6_SCTP_MAXSEG(r7, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={0x0, 0x9e37}, &(0x7f00000005c0)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000640)={r9, 0x2, 0x30, 0x0, 0x1}, &(0x7f0000000680)=0x18) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0xc4, &(0x7f0000000800)=[@in6={0xa, 0x4e24, 0x5, @ipv4={[], [], @broadcast}, 0x101}, @in={0x2, 0x4e22, @remote}, @in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e22, @rand_addr=0x4}, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e21, @remote}, @in6={0xa, 0x4e22, 0xa600000000000000, @mcast2, 0x3}, @in6={0xa, 0x4e24, 0x0, @loopback, 0x80000001}, @in={0x2, 0x4e24, @local}]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000140)={0x25, 0x204, 0x3, 0x5, r10}, &(0x7f0000000280)=0x10) [ 745.682545] hfs: unable to load codepage "ico8859-4" [ 745.687785] hfs: unable to parse mount options [ 745.815582] usb usb9: usbfs: process 18025 (syz-executor4) did not claim interface 0 before use [ 745.825278] usb usb9: check_ctrlrecip: process 18023 (syz-executor7) requesting ep 01 but needs 81 [ 745.834543] usb usb9: usbfs: process 18023 (syz-executor7) did not claim interface 0 before use [ 745.847520] hfs: unable to load codepage "i0o8859-4" [ 745.852850] hfs: unable to parse mount options 21:31:52 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'i\no8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 745.861080] usb usb9: usbfs: process 18030 (syz-executor1) did not claim interface 0 before use 21:31:52 executing program 6: 21:31:52 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) 21:31:52 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x60000000}) 21:31:52 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x7000000}) [ 745.940523] hfs: unable to load codepage "i0o8859-4" [ 745.945782] hfs: unable to parse mount options 21:31:52 executing program 5: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6, &(0x7f0000000a00)=[{&(0x7f0000000800)="d455304bf6ffeed8d0a4c108ba8b0d8af07ea57894ecd44d1821e108f903f841918b4d8481ac119739a749df190e1dbffa557d9c8b746391ac306d455f2ceaf3fadddb92c6f231f870a71d933f6efff9606cae24a995412cdc5a478d8eb82c33c36aea275bfc071ba7421407493799cc25fc1fd513569c530903f39535fa1fa895f48563b65c15957e242fdc581aa073f453034986b67b94d7f1309ac61027c5bf50c69b9a2f02179dacaa4231f8dac067849aa1a85b272fae038fc89e4eaf321bb2b56fd5ce149c587b20ebf90c80a0f3e67d471fbadd4fcbd08bf71389d3a92c0fb72ce0b9d241b39b90c7fdb8d9563f7a", 0xf2}, {&(0x7f0000000700)="84bc621039490eb90444b0199241bdcd8f7bbe76d0d86c3790e651a4f7d530e169cc212d283085a30772959c63347ec8e88681fd7fbffefb2f5e031aab5962aa7aa79cc0e35a8cbd54db8cd82e8482a6d59b57c7d1c1c4eb4825e31f9bf55ba366c198e31290dcadf85c97385173f9a5ff559080c3a39204b46ad60c064d42a0d145b07c67df9dbd8d87ec43509b233f96c285184f9712f040d32d9624426725ff93d95c4d98a81f71640b307c5f5a247d2366640a0417936a4f8854cc2798", 0xbf}, {&(0x7f0000000900)="2ce90bdb428a331949db0f30c3f3b5929a8bf4f0b2bf8a9b41c9e4efc5a21f19e69829f2431f6a5feac83d35c03e41c3330a0922f24a1df3bec5e3ad0ca6ce4d3898538ab99b69e7d2afcff760ec4e6ba618a4ebd3ada245690ee6ca61f7a708db12da53b37d6b004a1ec5e2a1489a7aa45ec9e43a43060a5b62d10f0f1b185442e8919ed96c967df01a75b477c95635dafa2251390ddd456e43783402a005c4961a1b931be30e74c5ff646f7c24f19d815a5371f0830d9f8b1b87074e937804341e5138ec83", 0xc6}, {&(0x7f0000000280)="be9927d9f33a2a1361a7e14754addb22b1034292efccd39a20c81cb30f4392d3485b46f815ce950da072a93cb46b0bb11e913dc7827d91ab855ce8cedbf8b6fd56580dec2909e1ef982787234dcfa565be135d288e1157a60fd5201a66f9c0", 0x5f, 0x8001}, {&(0x7f0000000640)="fa9bfe36dbf8d8fcd165078384d0a4bc224c34906a6f25df05808eb4bc33f53215c29895d53f9795af9c818658ce14c1a1c23e9de52ed1c46e7748fbc18f21736d5abacb1baabdf52a1b44a7b315f5c5f31547bef7f2980dc7f56e93bcdd9cf3e4e2713d75d6d8c5b01365efde3fd36bcb4f9b13febf36aa", 0x78, 0x6d}, {&(0x7f00000004c0)="b83e562fcc869ca455774188cce80d54b88b67", 0x13, 0x7}], 0x800040, &(0x7f0000000ac0)={[{@case_sensitive_no='case_sensitive=no'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x3}}, {@utf8='utf8'}, {@errors_continue='errors=continue'}]}) r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = request_key(&(0x7f00000005c0)='rxrpc\x00', &(0x7f0000000b40)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000b80)='nodevposix_acl_access/vboxnet0/ppp0\x00', 0xfffffffffffffffc) keyctl$revoke(0x3, r1) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) socket$bt_rfcomm(0x1f, 0x3, 0x3) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r2, 0x400454ce, r4) recvfrom$inet6(r2, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0xff, &(0x7f0000000080)=0x101, 0x4) ioctl$BLKGETSIZE64(r2, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r7, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r6, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:52 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x200000000000000}) [ 746.061401] usb usb9: usbfs: process 18049 (syz-executor4) did not claim interface 0 before use [ 746.087576] hfs: unable to load codepage "i [ 746.087576] o8859-4" [ 746.094237] hfs: unable to parse mount options 21:31:52 executing program 6: [ 746.118691] usb usb9: usbfs: process 18056 (syz-executor1) did not claim interface 0 before use 21:31:52 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'ilo8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 746.157779] ntfs: (device loop5): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 746.177638] ntfs: (device loop5): parse_options(): Unrecognized mount option . 21:31:52 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='reno\x00', 0x5) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000280)={'broute\x00', 0x0, 0x3, 0x72, [], 0x5, &(0x7f0000000300)=[{}, {}, {}, {}, {}], &(0x7f0000000180)=""/114}, &(0x7f0000000080)=0x78) 21:31:52 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x600}) 21:31:52 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x6c00}) [ 746.238432] hfs: unable to load codepage "i [ 746.238432] o8859-4" [ 746.245150] hfs: unable to parse mount options [ 746.264192] usb usb9: check_ctrlrecip: process 18070 (syz-executor7) requesting ep 01 but needs 81 [ 746.273450] usb usb9: usbfs: process 18070 (syz-executor7) did not claim interface 0 before use 21:31:52 executing program 6: 21:31:52 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'i-o8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 746.385752] hfs: unable to load codepage "ilo8859-4" [ 746.391138] hfs: unable to parse mount options [ 746.397321] usb usb9: usbfs: process 18086 (syz-executor1) did not claim interface 0 before use [ 746.421633] usb usb9: usbfs: process 18089 (syz-executor4) did not claim interface 0 before use 21:31:52 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x6800}) 21:31:52 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f0000000000)={[{0x6, 0x8001, 0x718, 0x8, 0x20, 0x9, 0x7, 0x4, 0x200, 0x9, 0x4, 0x1, 0xaed}, {0x3f, 0x1, 0x3, 0x7b, 0x6, 0x2, 0x1, 0x400, 0x7fffffff, 0x6, 0xfff, 0xffffffff, 0x9}, {0x200, 0x5, 0xc000000000000000, 0x6f5, 0x8, 0x101, 0x9, 0x3, 0x1000, 0xdf5, 0x4, 0x81, 0x5}], 0x2}) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000100)={0x7, 0xffffffffa6bb8281, 0x7fffffff, {0x77359400}, 0xc0, 0x101}) 21:31:52 executing program 6: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 746.500442] hfs: unable to load codepage "ilo8859-4" [ 746.505757] hfs: unable to parse mount options 21:31:52 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x6c00}) [ 746.585499] ntfs: (device loop5): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 746.605293] ntfs: (device loop5): parse_options(): Unrecognized mount option . 21:31:52 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'ioo8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 746.633881] hfs: unable to load codepage "i-o8859-4" [ 746.639105] hfs: unable to parse mount options [ 746.659656] usb usb9: check_ctrlrecip: process 18115 (syz-executor7) requesting ep 01 but needs 81 [ 746.669128] usb usb9: usbfs: process 18115 (syz-executor7) did not claim interface 0 before use 21:31:52 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x4800}) [ 746.725441] usb usb9: usbfs: process 18121 (syz-executor1) did not claim interface 0 before use 21:31:52 executing program 6: socket$inet6(0xa, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000040)=0x68000ffb, 0x100006c04) [ 746.802401] usb usb9: usbfs: process 18131 (syz-executor4) did not claim interface 0 before use [ 746.846946] hfs: unable to load codepage "ioo8859-4" [ 746.852243] hfs: unable to parse mount options 21:31:53 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x6002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x600000, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000100)={0x0, 0xb4f, 0x10000, 0x527, 0x24876ad1}) connect$llc(r1, &(0x7f0000000080)={0x1a, 0x339, 0x5, 0x1, 0xcaa3, 0x81, @broadcast}, 0x10) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x2) ftruncate(r2, 0x45ecf58d) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x80000, 0x0) 21:31:53 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'i.o8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:53 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x68}) 21:31:53 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:53 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x60}) [ 746.934475] hfs: unable to load codepage "ioo8859-4" [ 746.939738] hfs: unable to parse mount options 21:31:53 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x300000000000000}) [ 747.041740] usb usb9: usbfs: process 18154 (syz-executor1) did not claim interface 0 before use 21:31:53 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'i.o8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:53 executing program 0: r0 = inotify_init() ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)=0x80) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x4004550d, &(0x7f0000000240)) [ 747.131650] hfs: unable to load codepage "i.o8859-4" [ 747.136944] hfs: unable to parse mount options [ 747.146688] usb usb9: check_ctrlrecip: process 18169 (syz-executor7) requesting ep 01 but needs 81 [ 747.155964] usb usb9: usbfs: process 18169 (syz-executor7) did not claim interface 0 before use 21:31:53 executing program 6: socket$inet6(0xa, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000040)=0x68000ffb, 0x100006c04) [ 747.215163] usb usb9: usbfs: process 18176 (syz-executor4) did not claim interface 0 before use 21:31:53 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x6c}) [ 747.263796] hfs: unable to load codepage "i.o8859-4" [ 747.269071] hfs: unable to parse mount options [ 747.290989] usb usb9: usbfs: process 18176 (syz-executor4) did not claim interface 0 before use 21:31:53 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r5, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x40, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:53 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x6c}) [ 747.357178] hfs: unable to load codepage "i.o8859-4" [ 747.362462] hfs: unable to parse mount options 21:31:53 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f0000000000)) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) [ 747.406545] usb usb9: usbfs: process 18199 (syz-executor1) did not claim interface 0 before use 21:31:53 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iXo8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:53 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x3f00}) 21:31:53 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x100000000000000}) 21:31:53 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x4}, 0x20) [ 747.481521] hfs: unable to load codepage "i.o8859-4" [ 747.486748] hfs: unable to parse mount options [ 747.513664] usb usb9: check_ctrlrecip: process 18213 (syz-executor7) requesting ep 01 but needs 81 [ 747.522937] usb usb9: usbfs: process 18213 (syz-executor7) did not claim interface 0 before use 21:31:53 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) syz_mount_image$ceph(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="0e5c9c8169eed3205710353764b480753d68560cbc03f855226c38dc7cb903b695154cb9ac8c4ae6e71bd837bda66db2cd726b95b6a51aca812d89bf2c07bdef2dcb3446a3534795526012cf4e3b55f5a5f0fe54e568153d36e573e06c56a3b5aec9dcb52a9893b477ed8aac4e976923922a2795e8eaf94c47d3648f74dbb60c9f05b80f07ba118a609d60fb94ff5423590c190a4a33a2e801fc02e12d614b5de15fdac3387334fd6ad1e65b7cac9331c238bd5a81002e33379c13a4c1f70a4bc55586f48df8c0039d3c62ae98ae2fcdf60fb75e1c9a65", 0xd7, 0x7}], 0x800000, &(0x7f0000000200)='/dev/bus/usb/00#/00#\x00') 21:31:53 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'is\n8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 747.621909] usb usb9: usbfs: process 18225 (syz-executor4) did not claim interface 0 before use [ 747.654167] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 21:31:53 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) socketpair$inet(0x2, 0x6, 0x4, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:53 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x4000000}) [ 747.683272] hfs: unable to load codepage "iXo8859-4" [ 747.688489] hfs: unable to parse mount options [ 747.706452] usb usb9: usbfs: process 18232 (syz-executor1) did not claim interface 0 before use 21:31:53 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x4c}) [ 747.772515] ceph: device name is missing path (no : separator in /dev/loop0) [ 747.782720] hfs: unable to load codepage "iXo8859-4" [ 747.787930] hfs: unable to parse mount options [ 747.837673] hfs: unable to load codepage "is [ 747.837673] 8859-4" [ 747.844352] hfs: unable to parse mount options 21:31:54 executing program 6: socket$inet6(0xa, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)="2e2f6367726f75d9b6a30000008000000000", 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000040)=0x68000ffb, 0x100006c04) 21:31:54 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x2000000}) [ 747.881710] ceph: device name is missing path (no : separator in /dev/loop0) [ 747.893965] usb usb9: usbfs: process 18259 (syz-executor4) did not claim interface 0 before use [ 747.940141] usb usb9: check_ctrlrecip: process 18262 (syz-executor7) requesting ep 01 but needs 81 [ 747.949463] usb usb9: usbfs: process 18262 (syz-executor7) did not claim interface 0 before use [ 747.962574] hfs: unable to load codepage "is [ 747.962574] 8859-4" [ 747.969231] hfs: unable to parse mount options 21:31:54 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'ioo8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:54 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)={0x0, 0x100000000000, 0x0, 0x5, 0x3}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000080)=[{{r1, r2/1000+10000}, 0x0, 0x1ec, 0x7}], 0x18) write$vnet(r0, &(0x7f0000000140)={0x1, {&(0x7f0000000100)=""/58, 0x3a, &(0x7f0000000680)=""/4096, 0x1, 0x3}}, 0x68) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000280)=@security={'security\x00', 0xe, 0x4, 0x368, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d0, 0x2d0, 0x2d0, 0x2d0, 0x2d0, 0x4, &(0x7f0000000000), {[{{@ip={@broadcast, @dev={0xac, 0x14, 0x14, 0xa}, 0xff, 0xffffff00, 'ip6gre0\x00', 'bridge0\x00', {0xff}, {0xff}, 0x7f, 0xa488f708b3341e0f, 0x40}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x5, [0x9, 0xfffffffffffffff9, 0x3, 0x3, 0x3aac, 0x800], 0x0, 0x80, 0x1ff}}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x1, 0x7, 0x7b}}}, {{@ip={@broadcast, @local, 0x0, 0xff000000, 'team0\x00', 'veth0_to_bond\x00', {}, {0xff}, 0x21, 0x3, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x8000, [0x1f, 0x5, 0x80, 0xd32, 0x1], 0xd35, 0x6, 0x8}, {0xab, [0x5, 0x7ff, 0x401, 0x2, 0x8], 0x79f, 0x6, 0x1f}}}}, {{@ip={@loopback, @broadcast, 0x0, 0x0, 'veth0_to_team\x00', 'veth1_to_team\x00', {0xff}, {0xff}, 0x88, 0x3, 0x50}, 0x0, 0x98, 0xd8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x2, 0x20, "d442550cb3969dd7b408824dc33c09e96ce7197e002d5dbf3c2e08814f15"}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3c8) [ 748.058384] usb usb9: usbfs: process 18274 (syz-executor1) did not claim interface 0 before use 21:31:54 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x3f00000000000000}) 21:31:54 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x4800}) 21:31:54 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) mknod(&(0x7f0000000080)='./file0\x00', 0xc2d62d2e55040777, 0x9) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:54 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x5000000}) 21:31:54 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'is%8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 748.262719] hfs: unable to load codepage "ioo8859-4" [ 748.267971] hfs: unable to parse mount options 21:31:54 executing program 6: perf_event_open(&(0x7f0000aaa000)={0x2, 0x0, 0x857, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1300, r0, &(0x7f0000000000)={0x1000001c}) [ 748.313618] usb usb9: usbfs: process 18303 (syz-executor4) did not claim interface 0 before use [ 748.348172] usb usb9: usbfs: process 18310 (syz-executor1) did not claim interface 0 before use [ 748.364019] usb usb9: check_ctrlrecip: process 18312 (syz-executor7) requesting ep 01 but needs 81 [ 748.373346] usb usb9: usbfs: process 18312 (syz-executor7) did not claim interface 0 before use [ 748.380125] hfs: unable to load codepage "ioo8859-4" [ 748.387475] hfs: unable to parse mount options 21:31:54 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) 21:31:54 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x600000000000000}) [ 748.435556] hfs: unable to load codepage "is%8859-4" [ 748.440852] hfs: unable to parse mount options 21:31:54 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:54 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'i%o8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:54 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x2}) [ 748.536663] hfs: unable to load codepage "is%8859-4" [ 748.541883] hfs: unable to parse mount options 21:31:54 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x7}) 21:31:54 executing program 6: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0x1, 0x2000000000000256, &(0x7f0000b96f70)=@raw=[@map={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7a}], &(0x7f0000c43000)='GPL\x00', 0x0, 0xfffffe16, &(0x7f0000a97000)=""/4096}, 0x18) select(0x40, &(0x7f0000000000)={0x95f, 0x0, 0x0, 0x0, 0x7f}, &(0x7f0000000040)={0x100000000, 0x0, 0x0, 0x9cc5, 0x0, 0x2}, &(0x7f00000001c0)={0x0, 0x4, 0x80, 0x0, 0x0, 0x0, 0x4b}, &(0x7f0000000240)={0x77359400}) setfsuid(0x0) [ 748.603207] usb usb9: usbfs: process 18339 (syz-executor4) did not claim interface 0 before use 21:31:54 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000000)) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) 21:31:54 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso=859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 748.713371] usb usb9: usbfs: process 18339 (syz-executor4) did not claim interface 0 before use 21:31:54 executing program 6: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpid() open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendto$inet(r0, &(0x7f0000000240)="2b84f02a4b2a1fd136135a3fca09ef2c51b22f5abecdf0c52c93ce05ce8a6b7db56a03d2e7d3ab552a3382f7e301958eb321a49e580793c9c1dfb52c8a30144346e91568714e5735c9f5e90a1125fb60a430187ac08602cd29b59d0ff3e75497a5f60d342d7573140fcc71468d112b1d7527262c88c120cc9fc98c01719aaa8058258cc30b085fe96324e4c81d39387eb195ef906b4b29f9e7f0f793dbb9c6570f72854db3ab66ecbd8b5e25cc838acda8f73c7e8e", 0xb5, 0x80, &(0x7f0000000140)={0x2, 0x0, @loopback}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x7, 0x0, 0xffffffffffffbaa6, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet_buf(r0, 0x0, 0x60, &(0x7f00000000c0), 0x0) [ 748.755945] usb usb9: check_ctrlrecip: process 18361 (syz-executor7) requesting ep 01 but needs 81 [ 748.765195] usb usb9: usbfs: process 18361 (syz-executor7) did not claim interface 0 before use [ 748.774657] hfs: unable to load codepage "i%o8859-4" [ 748.775266] usb usb9: usbfs: process 18360 (syz-executor1) did not claim interface 0 before use [ 748.780134] hfs: unable to parse mount options 21:31:54 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000140), &(0x7f0000000280)=0x6) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f00000002c0)={0xa00000, 0x80000001}) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) symlinkat(&(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') close(r5) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x100027ffd, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r7, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, r6}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000640)={'security\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) 21:31:55 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x7a000000}) [ 748.876316] hfs: unable to load codepage "iso=859-4" [ 748.881716] hfs: unable to parse mount options 21:31:55 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000100)={@broadcast, @multicast1, 0x0}, &(0x7f0000000140)=0xc) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@mcast2, @dev={0xfe, 0x80, [], 0x21}, @remote, 0x4, 0x2e, 0x80000000, 0x100, 0xffffffff, 0x40000, r1}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) [ 748.919450] hfs: unable to load codepage "i%o8859-4" [ 748.924757] hfs: unable to parse mount options 21:31:55 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000000)={0x4, 0x3f, 0x1, 0x8000, 0x2f, 0x8000}) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) read$FUSE(r0, &(0x7f0000000280), 0x1000) 21:31:55 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x60000000}) 21:31:55 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x4800}) [ 749.003169] usb usb9: usbfs: process 18390 (syz-executor4) did not claim interface 0 before use [ 749.035943] hfs: unable to load codepage "iso=859-4" [ 749.041202] hfs: unable to parse mount options 21:31:55 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iuo8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:55 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e22, 0x3, @empty, 0xffffffffffffffff}, {0xa, 0x4e24, 0x401, @empty, 0x7ba1}, 0x6, [0x7f, 0xfff, 0x0, 0x7ff, 0x7, 0xf65, 0x0, 0x6e5b]}, 0x5c) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:55 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso\t859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:55 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x6000}) [ 749.145944] usb usb9: check_ctrlrecip: process 18408 (syz-executor7) requesting ep 01 but needs 81 [ 749.155409] usb usb9: usbfs: process 18408 (syz-executor7) did not claim interface 0 before use [ 749.172934] usb usb9: usbfs: process 18410 (syz-executor1) did not claim interface 0 before use 21:31:55 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)={0x0, 0x3}) 21:31:55 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000100)={@broadcast, @multicast1, 0x0}, &(0x7f0000000140)=0xc) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@mcast2, @dev={0xfe, 0x80, [], 0x21}, @remote, 0x4, 0x2e, 0x80000000, 0x100, 0xffffffff, 0x40000, r1}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) 21:31:55 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0xa00}) [ 749.348901] usb usb9: usbfs: process 18431 (syz-executor4) did not claim interface 0 before use [ 749.383271] hfs: unable to load codepage "iuo8859-4" [ 749.388588] hfs: unable to parse mount options 21:31:55 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x4c}) 21:31:55 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f00000000c0)={0x4}) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:55 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x8, @loopback, 0x4e21, 0x2, 'sed\x00', 0x30, 0x8, 0x5c}, 0x2c) [ 749.418414] hfs: unable to load codepage "iso 859-4" [ 749.423633] hfs: unable to parse mount options [ 749.425268] usb usb9: check_ctrlrecip: process 18443 (syz-executor7) requesting ep 01 but needs 81 [ 749.438112] usb usb9: usbfs: process 18443 (syz-executor7) did not claim interface 0 before use 21:31:55 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x5000000}) 21:31:55 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0xa}) [ 749.511521] hfs: unable to load codepage "iuo8859-4" [ 749.516769] hfs: unable to parse mount options [ 749.532132] usb usb9: usbfs: process 18455 (syz-executor1) did not claim interface 0 before use [ 749.541723] hfs: unable to load codepage "iso 859-4" [ 749.546940] hfs: unable to parse mount options 21:31:55 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'is%8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:55 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'isoP859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 749.662986] usb usb9: usbfs: process 18469 (syz-executor4) did not claim interface 0 before use 21:31:55 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x4c00}) 21:31:55 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x68000000}) [ 749.706645] usb usb9: check_ctrlrecip: process 18472 (syz-executor6) requesting ep 01 but needs 81 [ 749.715911] usb usb9: usbfs: process 18472 (syz-executor6) did not claim interface 0 before use 21:31:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r2, 0x80080) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) r3 = socket$inet6(0xa, 0x3, 0x101) sendfile(r2, r2, &(0x7f0000000100), 0x2008000fffffffe) fcntl$F_SET_RW_HINT(r3, 0x40c, &(0x7f0000000240)=0x6) 21:31:55 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_KEYBIT(r1, 0x40045565, 0x1f5) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 749.799153] usb usb9: usbfs: process 18482 (syz-executor1) did not claim interface 0 before use 21:31:56 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x6800000000000000}) [ 749.849548] usb usb9: check_ctrlrecip: process 18488 (syz-executor7) requesting ep 01 but needs 81 [ 749.858853] usb usb9: usbfs: process 18488 (syz-executor7) did not claim interface 0 before use 21:31:56 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x6}) [ 749.895993] hfs: unable to load codepage "isoP859-4" [ 749.901246] hfs: unable to parse mount options 21:31:56 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x700000000000000}) [ 749.963074] usb usb9: usbfs: process 18501 (syz-executor4) did not claim interface 0 before use [ 749.975370] hfs: unable to load codepage "is%8859-4" [ 749.980709] hfs: unable to parse mount options [ 750.007407] hfs: unable to load codepage "isoP859-4" [ 750.012695] hfs: unable to parse mount options [ 750.042640] hfs: unable to load codepage "is%8859-4" [ 750.047874] hfs: unable to parse mount options 21:31:56 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x74}) 21:31:56 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x7400}) [ 750.080911] usb usb9: usbfs: process 18517 (syz-executor6) did not claim interface 0 before use [ 750.093596] usb usb9: usbfs: process 18516 (syz-executor1) did not claim interface 0 before use 21:31:56 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r2) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) setsockopt$inet6_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000800)="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", 0x1000) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r0, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000080)=0x0) ptrace$getregs(0xe, r3, 0x80, &(0x7f00000000c0)=""/50) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x401200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) r6 = openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r7, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) ioctl$UFFDIO_COPY(r6, 0xc028aa03, &(0x7f0000000140)={&(0x7f000007f000/0x2000)=nil, &(0x7f000007d000/0x3000)=nil, 0x2000, 0x1}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:56 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'isoc859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:56 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'is\n8859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:56 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000340)={0x6, 0xfffffffffffffef6, 0x306, 0x0, 0x12}) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', &(0x7f0000000080)='/dev/bus/usb/00#/00#\x00'], &(0x7f0000000300)=[&(0x7f0000000140)='GPL^\\em1/\x00', &(0x7f0000000180)='\x00', &(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', &(0x7f0000000200)='#$/*eth0^nodev\x00', &(0x7f0000000280)='nodev\x00', &(0x7f00000003c0)='/dev/bus/usb/00#/00#\x00']) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) 21:31:56 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x6c00000000000000}) [ 750.214440] usb usb9: check_ctrlrecip: process 18523 (syz-executor7) requesting ep 01 but needs 81 [ 750.223875] usb usb9: usbfs: process 18523 (syz-executor7) did not claim interface 0 before use [ 750.233914] usb usb9: usbfs: process 18527 (syz-executor4) did not claim interface 0 before use 21:31:56 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x7a}) [ 750.347305] hfs: unable to load codepage "isoc859-4" [ 750.352890] hfs: unable to parse mount options [ 750.401704] usb usb9: usbfs: process 18550 (syz-executor1) did not claim interface 0 before use [ 750.425473] hfs: unable to load codepage "isoc859-4" [ 750.430717] hfs: unable to parse mount options 21:31:56 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x7400000000000000}) 21:31:56 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$NBD_DO_IT(r1, 0xab03) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000280)={0x8, 0x1, 0xc65c, 0x0, &(0x7f0000000080)=[{}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RSYMLINK(r1, &(0x7f00000004c0)={0x14, 0x11, 0x1, {0x20, 0x3, 0x3}}, 0x14) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 750.470907] usb usb9: usbfs: process 18555 (syz-executor4) did not claim interface 0 before use [ 750.471645] hfs: unable to load codepage "is [ 750.471645] 8859-4" [ 750.486447] hfs: unable to parse mount options 21:31:56 executing program 6: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x4c, &(0x7f0000000640)=[@in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e23, 0x7fffffff, @local, 0x3}, @in={0x2, 0x4e24, @rand_addr=0xfff}, @in={0x2, 0x4e21, @multicast1}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000800)={r5, 0xcd, "217c23a3e1900a08531e1367e3212ab180b024544c891aab1ec5393e10ce8479a7db027718799fb49674b0a7546e8e74fbf89367a64cdfc88a99d3d1b37142db4221101453e6f9477cbead0798679b95dbc2e0dfdbe0e3a1b67ee090dd8177dc55cbcfc661bebe83d8f5942bbc4c9bbb2c60f7383b78457b7e54aba0004d53fa4898a5e4ad38f859d959443394826b7e12c8361ac74119260560391ed952c3f689b0d9ce0feef2964ec3b747ddf7b3343fd9c62b26a44ac8a5c17cd8dd8d0bb16a34e02bbb6315ed3160d1ef41"}, &(0x7f00000004c0)=0xd5) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = semget(0x1, 0x2, 0x40) semctl$SEM_STAT(r7, 0x0, 0x12, &(0x7f0000000080)=""/44) close(r6) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r8, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r6, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000280)={{0xa, 0x4e20, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1, 0x80000}, 0xfffffffffffffffe, [0xb7, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd]}, 0x5c) [ 750.628774] usb usb9: check_ctrlrecip: process 18566 (syz-executor7) requesting ep 01 but needs 81 [ 750.638089] usb usb9: usbfs: process 18566 (syz-executor7) did not claim interface 0 before use [ 750.661786] hfs: unable to load codepage "is [ 750.661786] 8859-4" [ 750.668551] hfs: unable to parse mount options 21:31:56 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000f80)='keyring\x00', &(0x7f0000000fc0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) keyctl$get_keyring_id(0x0, r2, 0x5) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r4) statfs(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)=""/127) keyctl$invalidate(0x15, r2) getrusage(0x1, &(0x7f0000000700)) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r3, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000c00)='msdos\x00', &(0x7f0000000c40)='./file0\x00', 0x2, 0x3, &(0x7f0000000e00)=[{&(0x7f0000000c80)="0eca6f14acfccd808f5935be330f46cefa0ec2c238ef8073c8c71eb7fc3b012af9b0883dce694408a0742f7b45fb83aeb74ee3232c", 0x35, 0x1}, {&(0x7f0000000cc0)="3acf954c0070da7fcf5f21476d7101e940b9fd15817a28c58d38db4fd1c13004c211f975d4432eab18708d47648b4250c27b9aea34f3917c72d5770db9405ff21f101f021f062cbf82cf13ddf8bf24b484a4486f3aa8c57d9e9e2a8bee67769fb866f005433629ef5bcd84811ab000eb503f58b17307d3b6dc9b990ffe7020e4a6d52cc97cb5449e8a9fe170f29b82e69115c11c222fc38d0602e45875a5bfbf96fe7d1c98b38a0d03523fbc75a3295ce7f1fa8430f8920da831a85f578c5747d75f97926369531e", 0xc8, 0xfffffffffffffffc}, {&(0x7f0000000dc0)="6abcee5683a4cfaaa21674797c7bb35eebb198d761", 0x15, 0x6}], 0x100000, &(0x7f0000000f00)={[{@nodots='nodots'}, {@dots='dots'}, {@fat=@uid={'uid', 0x3d, r6}}, {@fat=@umask={'umask', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r8, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r7, &(0x7f0000000140), 0x4000}]) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) r9 = getuid() quotactl(0xfffffffffffffffd, &(0x7f0000000080)='./file0\x00', r9, &(0x7f0000000800)="cb4262837a65fcdae07181c2d9669f54328bac0e51e39c6230c6eebf58ab57c44d8c4618f2941af7ef39c0df198bf664429ec3e8c729c9c4d2315eeb8d012080fc5e718114a833aaf539808863255ee9a888377b01199c79823a9c3b15f20a6595f0274c421e1563b96ac5fdc62b87c35c060d257620d0e9b393f32d4f0fca187987c2cb1eb638bc1db08126d861111d28ac30cbd1f02f10f20c87a1b2dde22f8d1dcd62") setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:57 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x7a00}) 21:31:57 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x300}) 21:31:57 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso\n859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:57 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x7) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCOUTQNSD(r5, 0x894b, &(0x7f0000000140)) close(r6) r7 = openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) r8 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_ADD(r7, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="3494e9001e8f0095cd49c5b3aa90721ee1b1b9b4026fedec1aad7ae8a1245b3d3516279c1dc09b8ddae3d45cd026253eb5b78617fd5930d378e7", @ANYRES16=r8, @ANYBLOB="00022cbd7000fbdbdf2501000000080004000100000004000500080002000a000000040005000800040003000000"], 0x34}, 0x1, 0x0, 0x0, 0x81}, 0x4000841) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r9, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r6, &(0x7f0000000140), 0x4000}]) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f00000004c0)) r10 = semget(0x0, 0x2, 0x480) semctl$SEM_INFO(r10, 0x5, 0x13, &(0x7f0000000700)=""/187) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:57 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso2859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:57 executing program 6: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x4c, &(0x7f0000000640)=[@in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e23, 0x7fffffff, @local, 0x3}, @in={0x2, 0x4e24, @rand_addr=0xfff}, @in={0x2, 0x4e21, @multicast1}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000800)={r5, 0xcd, "217c23a3e1900a08531e1367e3212ab180b024544c891aab1ec5393e10ce8479a7db027718799fb49674b0a7546e8e74fbf89367a64cdfc88a99d3d1b37142db4221101453e6f9477cbead0798679b95dbc2e0dfdbe0e3a1b67ee090dd8177dc55cbcfc661bebe83d8f5942bbc4c9bbb2c60f7383b78457b7e54aba0004d53fa4898a5e4ad38f859d959443394826b7e12c8361ac74119260560391ed952c3f689b0d9ce0feef2964ec3b747ddf7b3343fd9c62b26a44ac8a5c17cd8dd8d0bb16a34e02bbb6315ed3160d1ef41"}, &(0x7f00000004c0)=0xd5) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = semget(0x1, 0x2, 0x40) semctl$SEM_STAT(r7, 0x0, 0x12, &(0x7f0000000080)=""/44) close(r6) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r8, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r6, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000280)={{0xa, 0x4e20, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1, 0x80000}, 0xfffffffffffffffe, [0xb7, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd]}, 0x5c) 21:31:57 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x4000000000000000}) [ 750.892633] usb usb9: usbfs: process 18590 (syz-executor4) did not claim interface 0 before use [ 750.904163] usb usb9: usbfs: process 18591 (syz-executor1) did not claim interface 0 before use [ 750.943551] usb usb9: check_ctrlrecip: process 18603 (syz-executor7) requesting ep 01 but needs 81 [ 750.952916] usb usb9: usbfs: process 18603 (syz-executor7) did not claim interface 0 before use [ 750.975078] hfs: unable to load codepage "iso [ 750.975078] 859-4" [ 750.981764] hfs: unable to parse mount options 21:31:57 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x4800000000000000}) [ 751.015717] hfs: unable to load codepage "iso2859-4" [ 751.020953] hfs: unable to parse mount options 21:31:57 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x48000000}) [ 751.080504] hfs: unable to load codepage "iso [ 751.080504] 859-4" [ 751.087150] hfs: unable to parse mount options 21:31:57 executing program 6: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x4c, &(0x7f0000000640)=[@in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e23, 0x7fffffff, @local, 0x3}, @in={0x2, 0x4e24, @rand_addr=0xfff}, @in={0x2, 0x4e21, @multicast1}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000800)={r5, 0xcd, "217c23a3e1900a08531e1367e3212ab180b024544c891aab1ec5393e10ce8479a7db027718799fb49674b0a7546e8e74fbf89367a64cdfc88a99d3d1b37142db4221101453e6f9477cbead0798679b95dbc2e0dfdbe0e3a1b67ee090dd8177dc55cbcfc661bebe83d8f5942bbc4c9bbb2c60f7383b78457b7e54aba0004d53fa4898a5e4ad38f859d959443394826b7e12c8361ac74119260560391ed952c3f689b0d9ce0feef2964ec3b747ddf7b3343fd9c62b26a44ac8a5c17cd8dd8d0bb16a34e02bbb6315ed3160d1ef41"}, &(0x7f00000004c0)=0xd5) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = semget(0x1, 0x2, 0x40) semctl$SEM_STAT(r7, 0x0, 0x12, &(0x7f0000000080)=""/44) close(r6) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r8, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r6, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000280)={{0xa, 0x4e20, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1, 0x80000}, 0xfffffffffffffffe, [0xb7, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd]}, 0x5c) 21:31:57 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x6000000}) [ 751.127234] hfs: unable to load codepage "iso2859-4" [ 751.132559] hfs: unable to parse mount options 21:31:57 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000140)=0x14) [ 751.198777] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 751.198777] [ 751.248654] usb usb9: usbfs: process 18631 (syz-executor4) did not claim interface 0 before use 21:31:57 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso2859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 751.291510] usb usb9: usbfs: process 18633 (syz-executor1) did not claim interface 0 before use [ 751.323411] usb usb9: check_ctrlrecip: process 18638 (syz-executor7) requesting ep 01 but needs 81 [ 751.332686] usb usb9: usbfs: process 18638 (syz-executor7) did not claim interface 0 before use 21:31:57 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso<859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:57 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x7a000000}) 21:31:57 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000f80)='keyring\x00', &(0x7f0000000fc0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) keyctl$get_keyring_id(0x0, r2, 0x5) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r4) statfs(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)=""/127) keyctl$invalidate(0x15, r2) getrusage(0x1, &(0x7f0000000700)) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r3, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000c00)='msdos\x00', &(0x7f0000000c40)='./file0\x00', 0x2, 0x3, &(0x7f0000000e00)=[{&(0x7f0000000c80)="0eca6f14acfccd808f5935be330f46cefa0ec2c238ef8073c8c71eb7fc3b012af9b0883dce694408a0742f7b45fb83aeb74ee3232c", 0x35, 0x1}, {&(0x7f0000000cc0)="3acf954c0070da7fcf5f21476d7101e940b9fd15817a28c58d38db4fd1c13004c211f975d4432eab18708d47648b4250c27b9aea34f3917c72d5770db9405ff21f101f021f062cbf82cf13ddf8bf24b484a4486f3aa8c57d9e9e2a8bee67769fb866f005433629ef5bcd84811ab000eb503f58b17307d3b6dc9b990ffe7020e4a6d52cc97cb5449e8a9fe170f29b82e69115c11c222fc38d0602e45875a5bfbf96fe7d1c98b38a0d03523fbc75a3295ce7f1fa8430f8920da831a85f578c5747d75f97926369531e", 0xc8, 0xfffffffffffffffc}, {&(0x7f0000000dc0)="6abcee5683a4cfaaa21674797c7bb35eebb198d761", 0x15, 0x6}], 0x100000, &(0x7f0000000f00)={[{@nodots='nodots'}, {@dots='dots'}, {@fat=@uid={'uid', 0x3d, r6}}, {@fat=@umask={'umask', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r8, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r7, &(0x7f0000000140), 0x4000}]) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) r9 = getuid() quotactl(0xfffffffffffffffd, &(0x7f0000000080)='./file0\x00', r9, &(0x7f0000000800)="cb4262837a65fcdae07181c2d9669f54328bac0e51e39c6230c6eebf58ab57c44d8c4618f2941af7ef39c0df198bf664429ec3e8c729c9c4d2315eeb8d012080fc5e718114a833aaf539808863255ee9a888377b01199c79823a9c3b15f20a6595f0274c421e1563b96ac5fdc62b87c35c060d257620d0e9b393f32d4f0fca187987c2cb1eb638bc1db08126d861111d28ac30cbd1f02f10f20c87a1b2dde22f8d1dcd62") setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:57 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x3000000}) 21:31:57 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x7a000000}) [ 751.502793] hfs: unable to load codepage "iso2859-4" [ 751.508168] hfs: unable to parse mount options 21:31:57 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) 21:31:57 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r2, 0x80080) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000100)={0x4, 0x7, 0x3, 0xec7, 0x50ef}) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) [ 751.558200] hfs: unable to load codepage "iso<859-4" [ 751.563464] hfs: unable to parse mount options [ 751.573157] usb usb9: usbfs: process 18666 (syz-executor1) did not claim interface 0 before use [ 751.586672] usb usb9: usbfs: process 18674 (syz-executor4) did not claim interface 0 before use [ 751.625566] hfs: unable to load codepage "iso2859-4" [ 751.630980] hfs: unable to parse mount options [ 751.656497] hfs: unable to load codepage "iso<859-4" [ 751.661730] hfs: unable to parse mount options [ 751.677999] usb usb9: check_ctrlrecip: process 18685 (syz-executor7) requesting ep 01 but needs 81 [ 751.687259] usb usb9: usbfs: process 18685 (syz-executor7) did not claim interface 0 before use 21:31:57 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x4c000000}) 21:31:57 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso<859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:57 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x300}) 21:31:57 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso=859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 751.799747] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 751.799747] 21:31:58 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)=0x0) r5 = shmget(0x0, 0x3000, 0x180, &(0x7f000007f000/0x3000)=nil) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f0000000040)=0xe8) fstat(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000080)=0x0) r9 = fcntl$getown(r0, 0x9) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000640)={{0xd53, r6, r3, r7, r4, 0x10, 0x80000001}, 0x4, 0x8, 0x7f, 0x2, r8, r9, 0x8001}) ioctl$TUNSETGROUP(r1, 0x400454ce, r4) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f00000000c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r11) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r12, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r11, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 751.849655] EXT4-fs warning (device sda1): verify_group_input:104: Cannot add at group 4 (only 16 groups) 21:31:58 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x7400}) [ 752.093222] usb usb9: usbfs: process 18704 (syz-executor1) did not claim interface 0 before use [ 752.105140] usb usb9: usbfs: process 18724 (syz-executor4) did not claim interface 0 before use [ 752.175252] hfs: unable to load codepage "iso=859-4" [ 752.180620] hfs: unable to parse mount options 21:31:58 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x2000000}) 21:31:58 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000f80)='keyring\x00', &(0x7f0000000fc0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) keyctl$get_keyring_id(0x0, r2, 0x5) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r4) statfs(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)=""/127) keyctl$invalidate(0x15, r2) getrusage(0x1, &(0x7f0000000700)) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r3, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000c00)='msdos\x00', &(0x7f0000000c40)='./file0\x00', 0x2, 0x3, &(0x7f0000000e00)=[{&(0x7f0000000c80)="0eca6f14acfccd808f5935be330f46cefa0ec2c238ef8073c8c71eb7fc3b012af9b0883dce694408a0742f7b45fb83aeb74ee3232c", 0x35, 0x1}, {&(0x7f0000000cc0)="3acf954c0070da7fcf5f21476d7101e940b9fd15817a28c58d38db4fd1c13004c211f975d4432eab18708d47648b4250c27b9aea34f3917c72d5770db9405ff21f101f021f062cbf82cf13ddf8bf24b484a4486f3aa8c57d9e9e2a8bee67769fb866f005433629ef5bcd84811ab000eb503f58b17307d3b6dc9b990ffe7020e4a6d52cc97cb5449e8a9fe170f29b82e69115c11c222fc38d0602e45875a5bfbf96fe7d1c98b38a0d03523fbc75a3295ce7f1fa8430f8920da831a85f578c5747d75f97926369531e", 0xc8, 0xfffffffffffffffc}, {&(0x7f0000000dc0)="6abcee5683a4cfaaa21674797c7bb35eebb198d761", 0x15, 0x6}], 0x100000, &(0x7f0000000f00)={[{@nodots='nodots'}, {@dots='dots'}, {@fat=@uid={'uid', 0x3d, r6}}, {@fat=@umask={'umask', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r8, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r7, &(0x7f0000000140), 0x4000}]) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) r9 = getuid() quotactl(0xfffffffffffffffd, &(0x7f0000000080)='./file0\x00', r9, &(0x7f0000000800)="cb4262837a65fcdae07181c2d9669f54328bac0e51e39c6230c6eebf58ab57c44d8c4618f2941af7ef39c0df198bf664429ec3e8c729c9c4d2315eeb8d012080fc5e718114a833aaf539808863255ee9a888377b01199c79823a9c3b15f20a6595f0274c421e1563b96ac5fdc62b87c35c060d257620d0e9b393f32d4f0fca187987c2cb1eb638bc1db08126d861111d28ac30cbd1f02f10f20c87a1b2dde22f8d1dcd62") setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:58 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x7a00000000000000}) [ 752.217086] usb usb9: check_ctrlrecip: process 18738 (syz-executor7) requesting ep 01 but needs 81 [ 752.226493] usb usb9: usbfs: process 18738 (syz-executor7) did not claim interface 0 before use [ 752.236991] hfs: unable to load codepage "iso<859-4" [ 752.242192] hfs: unable to parse mount options 21:31:58 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x7400}) [ 752.310556] hfs: unable to load codepage "iso=859-4" [ 752.316139] hfs: unable to parse mount options [ 752.337562] hfs: unable to load codepage "iso<859-4" [ 752.342776] hfs: unable to parse mount options 21:31:58 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x422100, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:58 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso\n859-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 752.396499] usb usb9: usbfs: process 18757 (syz-executor4) did not claim interface 0 before use [ 752.425814] usb usb9: usbfs: process 18760 (syz-executor6) did not claim interface 0 before use 21:31:58 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x600}) [ 752.464000] usb usb9: usbfs: process 18765 (syz-executor1) did not claim interface 0 before use 21:31:58 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8<59-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:58 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x200000000000000}) [ 752.559677] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 752.559677] [ 752.585283] usb usb9: check_ctrlrecip: process 18780 (syz-executor7) requesting ep 01 but needs 81 [ 752.594573] usb usb9: usbfs: process 18780 (syz-executor7) did not claim interface 0 before use 21:31:58 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) uselib(&(0x7f0000000000)='./file0\x00') 21:31:58 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x5}) [ 752.668495] hfs: unable to load codepage "iso [ 752.668495] 859-4" [ 752.675158] hfs: unable to parse mount options 21:31:58 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540)=0x0, &(0x7f0000000580)) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 752.765656] usb usb9: usbfs: process 18802 (syz-executor4) did not claim interface 0 before use [ 752.775586] hfs: unable to load codepage "iso [ 752.775586] 859-4" [ 752.782213] hfs: unable to parse mount options 21:31:58 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x700}) 21:31:59 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000f80)='keyring\x00', &(0x7f0000000fc0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) keyctl$get_keyring_id(0x0, r2, 0x5) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r4) statfs(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)=""/127) keyctl$invalidate(0x15, r2) getrusage(0x1, &(0x7f0000000700)) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r3, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000c00)='msdos\x00', &(0x7f0000000c40)='./file0\x00', 0x2, 0x3, &(0x7f0000000e00)=[{&(0x7f0000000c80)="0eca6f14acfccd808f5935be330f46cefa0ec2c238ef8073c8c71eb7fc3b012af9b0883dce694408a0742f7b45fb83aeb74ee3232c", 0x35, 0x1}, {&(0x7f0000000cc0)="3acf954c0070da7fcf5f21476d7101e940b9fd15817a28c58d38db4fd1c13004c211f975d4432eab18708d47648b4250c27b9aea34f3917c72d5770db9405ff21f101f021f062cbf82cf13ddf8bf24b484a4486f3aa8c57d9e9e2a8bee67769fb866f005433629ef5bcd84811ab000eb503f58b17307d3b6dc9b990ffe7020e4a6d52cc97cb5449e8a9fe170f29b82e69115c11c222fc38d0602e45875a5bfbf96fe7d1c98b38a0d03523fbc75a3295ce7f1fa8430f8920da831a85f578c5747d75f97926369531e", 0xc8, 0xfffffffffffffffc}, {&(0x7f0000000dc0)="6abcee5683a4cfaaa21674797c7bb35eebb198d761", 0x15, 0x6}], 0x100000, &(0x7f0000000f00)={[{@nodots='nodots'}, {@dots='dots'}, {@fat=@uid={'uid', 0x3d, r6}}, {@fat=@umask={'umask', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r8, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r7, &(0x7f0000000140), 0x4000}]) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) r9 = getuid() quotactl(0xfffffffffffffffd, &(0x7f0000000080)='./file0\x00', r9, &(0x7f0000000800)="cb4262837a65fcdae07181c2d9669f54328bac0e51e39c6230c6eebf58ab57c44d8c4618f2941af7ef39c0df198bf664429ec3e8c729c9c4d2315eeb8d012080fc5e718114a833aaf539808863255ee9a888377b01199c79823a9c3b15f20a6595f0274c421e1563b96ac5fdc62b87c35c060d257620d0e9b393f32d4f0fca187987c2cb1eb638bc1db08126d861111d28ac30cbd1f02f10f20c87a1b2dde22f8d1dcd62") setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) [ 752.823375] usb usb9: usbfs: process 18810 (syz-executor1) did not claim interface 0 before use 21:31:59 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000000)={0x0, 0x0, 0x4}) [ 752.883552] hfs: unable to load codepage "iso8<59-4" [ 752.889113] hfs: unable to parse mount options 21:31:59 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8<59-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:59 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x7}) 21:31:59 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x700}) [ 752.969484] usb usb9: check_ctrlrecip: process 18823 (syz-executor7) requesting ep 01 but needs 81 [ 752.978735] usb usb9: usbfs: process 18823 (syz-executor7) did not claim interface 0 before use [ 753.001562] hfs: unable to load codepage "iso8<59-4" [ 753.006779] hfs: unable to parse mount options 21:31:59 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x2022, &(0x7f0000000480)={0xa, 0x4e23, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f00000000c0)={0xd, 0x100, 0x2d0b}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x2201fe, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2000, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x800000000001000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:59 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x200000000000000}) 21:31:59 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8=59-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 753.147629] hfs: unable to load codepage "iso8<59-4" [ 753.152843] hfs: unable to parse mount options [ 753.187221] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 753.187221] 21:31:59 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x48}) [ 753.225913] usb usb9: usbfs: process 18853 (syz-executor1) did not claim interface 0 before use [ 753.284303] hfs: unable to load codepage "iso8<59-4" [ 753.289610] hfs: unable to parse mount options [ 753.300421] usb usb9: usbfs: process 18865 (syz-executor6) did not claim interface 0 before use 21:31:59 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x6c00000000000000}) [ 753.351738] usb usb9: check_ctrlrecip: process 18870 (syz-executor7) requesting ep 01 but needs 81 [ 753.361125] usb usb9: usbfs: process 18870 (syz-executor7) did not claim interface 0 before use 21:31:59 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000f80)='keyring\x00', &(0x7f0000000fc0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) keyctl$get_keyring_id(0x0, r2, 0x5) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r4) statfs(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)=""/127) keyctl$invalidate(0x15, r2) getrusage(0x1, &(0x7f0000000700)) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r3, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000c00)='msdos\x00', &(0x7f0000000c40)='./file0\x00', 0x2, 0x3, &(0x7f0000000e00)=[{&(0x7f0000000c80)="0eca6f14acfccd808f5935be330f46cefa0ec2c238ef8073c8c71eb7fc3b012af9b0883dce694408a0742f7b45fb83aeb74ee3232c", 0x35, 0x1}, {&(0x7f0000000cc0)="3acf954c0070da7fcf5f21476d7101e940b9fd15817a28c58d38db4fd1c13004c211f975d4432eab18708d47648b4250c27b9aea34f3917c72d5770db9405ff21f101f021f062cbf82cf13ddf8bf24b484a4486f3aa8c57d9e9e2a8bee67769fb866f005433629ef5bcd84811ab000eb503f58b17307d3b6dc9b990ffe7020e4a6d52cc97cb5449e8a9fe170f29b82e69115c11c222fc38d0602e45875a5bfbf96fe7d1c98b38a0d03523fbc75a3295ce7f1fa8430f8920da831a85f578c5747d75f97926369531e", 0xc8, 0xfffffffffffffffc}, {&(0x7f0000000dc0)="6abcee5683a4cfaaa21674797c7bb35eebb198d761", 0x15, 0x6}], 0x100000, &(0x7f0000000f00)={[{@nodots='nodots'}, {@dots='dots'}, {@fat=@uid={'uid', 0x3d, r6}}, {@fat=@umask={'umask', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r8, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r7, &(0x7f0000000140), 0x4000}]) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) r9 = getuid() quotactl(0xfffffffffffffffd, &(0x7f0000000080)='./file0\x00', r9, &(0x7f0000000800)="cb4262837a65fcdae07181c2d9669f54328bac0e51e39c6230c6eebf58ab57c44d8c4618f2941af7ef39c0df198bf664429ec3e8c729c9c4d2315eeb8d012080fc5e718114a833aaf539808863255ee9a888377b01199c79823a9c3b15f20a6595f0274c421e1563b96ac5fdc62b87c35c060d257620d0e9b393f32d4f0fca187987c2cb1eb638bc1db08126d861111d28ac30cbd1f02f10f20c87a1b2dde22f8d1dcd62") [ 753.393669] hfs: unable to load codepage "iso8=59-4" [ 753.398902] hfs: unable to parse mount options 21:31:59 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8=59-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:31:59 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0xffffff7f00000000}) [ 753.434778] usb usb9: usbfs: process 18877 (syz-executor4) did not claim interface 0 before use 21:31:59 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000080)=0x7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:31:59 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)) fcntl$addseals(r0, 0x409, 0x6) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000100)) [ 753.493469] hfs: unable to load codepage "iso8=59-4" [ 753.498726] hfs: unable to parse mount options 21:31:59 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x600000000000000}) [ 753.589782] usb usb9: usbfs: process 18894 (syz-executor1) did not claim interface 0 before use 21:31:59 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x4}) 21:31:59 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8\t59-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 753.667599] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 753.667599] [ 753.680367] hfs: unable to load codepage "iso8=59-4" [ 753.685711] hfs: unable to parse mount options 21:31:59 executing program 6: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) fadvise64(r1, 0x0, 0x8, 0x0) r2 = dup(r0) r3 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r2, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r3, 0x80080) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xab6e}}, 0x30) sendfile(r2, r3, &(0x7f0000d83ff8), 0x2008000fffffffe) [ 753.777319] usb usb9: check_ctrlrecip: process 18918 (syz-executor7) requesting ep 01 but needs 81 [ 753.786670] usb usb9: usbfs: process 18918 (syz-executor7) did not claim interface 0 before use [ 753.798259] hfs: unable to load codepage "iso8=59-4" [ 753.803520] hfs: unable to parse mount options [ 753.805200] usb usb9: usbfs: process 18915 (syz-executor4) did not claim interface 0 before use 21:32:00 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x3f00}) 21:32:00 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) r6 = gettid() fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp$KCMP_EPOLL_TFD(r6, r7, 0x7, r1, &(0x7f00000000c0)={r1, r2, 0x7f}) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r8, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:32:00 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000f80)='keyring\x00', &(0x7f0000000fc0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) keyctl$get_keyring_id(0x0, r2, 0x5) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r4) statfs(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)=""/127) keyctl$invalidate(0x15, r2) getrusage(0x1, &(0x7f0000000700)) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r3, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000c00)='msdos\x00', &(0x7f0000000c40)='./file0\x00', 0x2, 0x3, &(0x7f0000000e00)=[{&(0x7f0000000c80)="0eca6f14acfccd808f5935be330f46cefa0ec2c238ef8073c8c71eb7fc3b012af9b0883dce694408a0742f7b45fb83aeb74ee3232c", 0x35, 0x1}, {&(0x7f0000000cc0)="3acf954c0070da7fcf5f21476d7101e940b9fd15817a28c58d38db4fd1c13004c211f975d4432eab18708d47648b4250c27b9aea34f3917c72d5770db9405ff21f101f021f062cbf82cf13ddf8bf24b484a4486f3aa8c57d9e9e2a8bee67769fb866f005433629ef5bcd84811ab000eb503f58b17307d3b6dc9b990ffe7020e4a6d52cc97cb5449e8a9fe170f29b82e69115c11c222fc38d0602e45875a5bfbf96fe7d1c98b38a0d03523fbc75a3295ce7f1fa8430f8920da831a85f578c5747d75f97926369531e", 0xc8, 0xfffffffffffffffc}, {&(0x7f0000000dc0)="6abcee5683a4cfaaa21674797c7bb35eebb198d761", 0x15, 0x6}], 0x100000, &(0x7f0000000f00)={[{@nodots='nodots'}, {@dots='dots'}, {@fat=@uid={'uid', 0x3d, r6}}, {@fat=@umask={'umask', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r8, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r7, &(0x7f0000000140), 0x4000}]) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) getuid() 21:32:00 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8\n59-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 753.910448] hfs: unable to load codepage "iso8 59-4" [ 753.915673] hfs: unable to parse mount options 21:32:00 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x4800000000000000}) [ 754.027550] hfs: unable to load codepage "iso8 59-4" [ 754.032806] hfs: unable to parse mount options [ 754.053562] usb usb9: usbfs: process 18949 (syz-executor1) did not claim interface 0 before use 21:32:00 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x3f000000}) 21:32:00 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8P59-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 754.103260] hfs: unable to load codepage "iso8 [ 754.103260] 59-4" [ 754.109969] hfs: unable to parse mount options [ 754.119181] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 754.119181] 21:32:00 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x3}) [ 754.171163] usb usb9: usbfs: process 18961 (syz-executor4) did not claim interface 0 before use 21:32:00 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x8000000000000400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000140), &(0x7f00000000c0)=0x4) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000100)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffbfffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x100, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_submit(0x0, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0x33, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:32:00 executing program 6: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) shmget(0x3, 0x3000, 0x2, &(0x7f0000ffd000/0x3000)=nil) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x4001ff) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r5, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) set_tid_address(&(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e21, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x10001000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0xffffffff, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x14b) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 754.238686] usb usb9: check_ctrlrecip: process 18963 (syz-executor7) requesting ep 01 but needs 81 [ 754.248017] usb usb9: usbfs: process 18963 (syz-executor7) did not claim interface 0 before use [ 754.274129] hfs: unable to load codepage "iso8 [ 754.274129] 59-4" [ 754.280730] hfs: unable to parse mount options 21:32:00 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x74}) 21:32:00 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000f80)='keyring\x00', &(0x7f0000000fc0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) keyctl$get_keyring_id(0x0, r2, 0x5) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r4) statfs(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)=""/127) keyctl$invalidate(0x15, r2) getrusage(0x1, &(0x7f0000000700)) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r3, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000c00)='msdos\x00', &(0x7f0000000c40)='./file0\x00', 0x2, 0x3, &(0x7f0000000e00)=[{&(0x7f0000000c80)="0eca6f14acfccd808f5935be330f46cefa0ec2c238ef8073c8c71eb7fc3b012af9b0883dce694408a0742f7b45fb83aeb74ee3232c", 0x35, 0x1}, {&(0x7f0000000cc0)="3acf954c0070da7fcf5f21476d7101e940b9fd15817a28c58d38db4fd1c13004c211f975d4432eab18708d47648b4250c27b9aea34f3917c72d5770db9405ff21f101f021f062cbf82cf13ddf8bf24b484a4486f3aa8c57d9e9e2a8bee67769fb866f005433629ef5bcd84811ab000eb503f58b17307d3b6dc9b990ffe7020e4a6d52cc97cb5449e8a9fe170f29b82e69115c11c222fc38d0602e45875a5bfbf96fe7d1c98b38a0d03523fbc75a3295ce7f1fa8430f8920da831a85f578c5747d75f97926369531e", 0xc8, 0xfffffffffffffffc}, {&(0x7f0000000dc0)="6abcee5683a4cfaaa21674797c7bb35eebb198d761", 0x15, 0x6}], 0x100000, &(0x7f0000000f00)={[{@nodots='nodots'}, {@dots='dots'}, {@fat=@uid={'uid', 0x3d, r6}}, {@fat=@umask={'umask', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r8, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r7, &(0x7f0000000140), 0x4000}]) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) [ 754.410404] hfs: unable to load codepage "iso8P59-4" [ 754.415833] hfs: unable to parse mount options [ 754.427722] usb usb9: usbfs: process 18986 (syz-executor1) did not claim interface 0 before use 21:32:00 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8259-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:00 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x40000000}) 21:32:00 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x3f00000000000000}) [ 754.510480] hfs: unable to load codepage "iso8P59-4" [ 754.515766] hfs: unable to parse mount options [ 754.520912] usb usb9: usbfs: process 18994 (syz-executor4) did not claim interface 0 before use 21:32:00 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540)=0x0, &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r4) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000140)={0x2, 0x0, 0x70, &(0x7f0000000080)="ced41c03e0328a900e562371ab0b68122993f42473e66ff172bf0a13244355838995b24fc0cb8967f313e0d0617e74bda84fcb3df6f4a5f53b0dafbe13f558e383335af6aee205becd8f5c6dff0d9dbbd1233ff29fc148ebf61b2df5043e818e988b74cceb629a035490cc0ecb3fc460"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) r7 = openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) write(r6, &(0x7f0000000640)="af6ea497e589b5590657d288f4dec90eee69f333b9dce15265bc6a7798ac4ce316bb26dc0cee4a318ec83fb2ff2411a9a1aadfa4aa19f3f4716c9ae4b544e0b8e404501cbc0e72087000d99a917d740c42ff916dd4cc953ec5cc2c579138748381d0b7f396e2d7e957d597ce4c6a25f18e53a0a6ec36a53557e3", 0x7a) io_submit(r8, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r6, &(0x7f0000000140), 0x4000}]) ioctl$BINDER_GET_NODE_DEBUG_INFO(r7, 0xc018620b, &(0x7f00000004c0)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r7, 0xc018620b, &(0x7f00000005c0)={r9}) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0xb, @mcast2, 0xff}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x6, 0x2, 0x2000000008]}, 0x5c) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000800)={{{@in=@rand_addr, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000002c0)={r10, 0x1, 0x6, @dev={[], 0x1f}}, 0x10) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) socket$inet6(0xa, 0x80000, 0x1ff) 21:32:00 executing program 6 (fault-call:3 fault-nth:0): r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x0, 0x1000000}) 21:32:00 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8c59-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 754.681796] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 754.681796] [ 754.743071] usb usb9: check_ctrlrecip: process 19017 (syz-executor7) requesting ep 01 but needs 81 [ 754.752312] usb usb9: usbfs: process 19017 (syz-executor7) did not claim interface 0 before use [ 754.761796] usb usb9: usbfs: process 19016 (syz-executor1) did not claim interface 0 before use [ 754.771093] hfs: unable to load codepage "iso8259-4" [ 754.776117] FAULT_INJECTION: forcing a failure. [ 754.776117] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 754.776375] hfs: unable to parse mount options 21:32:00 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0xa00000000000000}) [ 754.788197] CPU: 1 PID: 19022 Comm: syz-executor6 Not tainted 4.19.0-rc2+ #220 [ 754.800070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 754.809453] Call Trace: [ 754.812219] dump_stack+0x1c9/0x2b4 [ 754.815891] ? dump_stack_print_info.cold.2+0x52/0x52 [ 754.821135] ? perf_trace_lock+0xde/0x920 [ 754.825367] should_fail.cold.4+0xa/0x11 [ 754.829486] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 754.834629] ? graph_lock+0x170/0x170 [ 754.838452] ? print_usage_bug+0xc0/0xc0 [ 754.842523] ? graph_lock+0x170/0x170 [ 754.846366] ? find_held_lock+0x36/0x1c0 [ 754.850450] ? __lock_is_held+0xb5/0x140 [ 754.854598] ? check_same_owner+0x340/0x340 [ 754.858941] ? __mutex_lock+0x6d0/0x1700 [ 754.863019] ? rcu_note_context_switch+0x680/0x680 [ 754.868007] __alloc_pages_nodemask+0x365/0xd10 [ 754.872700] ? mark_held_locks+0x160/0x160 [ 754.876940] ? __alloc_pages_slowpath+0x2cb0/0x2cb0 [ 754.881980] ? lock_downgrade+0x8f0/0x8f0 [ 754.886148] ? lock_release+0x9f0/0x9f0 [ 754.890146] ? check_same_owner+0x340/0x340 [ 754.894489] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 754.899518] ? usbfs_increase_memory_usage+0xf7/0x1d0 [ 754.904727] ? usbfs_decrease_memory_usage+0x30/0x30 [ 754.909833] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 754.915389] alloc_pages_current+0x10c/0x210 [ 754.919816] ? check_ctrlrecip+0xa9/0x320 [ 754.923983] __get_free_pages+0xc/0x40 [ 754.927872] proc_control+0x227/0xef0 [ 754.931684] ? proc_bulk+0xaa0/0xaa0 [ 754.935416] usbdev_do_ioctl+0x1eb4/0x3b30 [ 754.939683] ? processcompl_compat+0x680/0x680 [ 754.944299] ? mark_held_locks+0x160/0x160 [ 754.949993] ? zap_class+0x740/0x740 [ 754.953732] ? zap_class+0x740/0x740 [ 754.957449] ? graph_lock+0x170/0x170 [ 754.961253] ? graph_lock+0x170/0x170 [ 754.965092] ? perf_trace_lock+0xde/0x920 [ 754.969270] ? perf_trace_lock+0xde/0x920 [ 754.973425] ? zap_class+0x740/0x740 [ 754.977151] ? zap_class+0x740/0x740 [ 754.980887] ? find_held_lock+0x36/0x1c0 [ 754.984975] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 754.990540] ? _parse_integer+0x13b/0x190 [ 754.994709] ? graph_lock+0x170/0x170 [ 754.998510] ? graph_lock+0x170/0x170 [ 755.002351] ? _parse_integer+0x190/0x190 [ 755.006535] ? zap_class+0x740/0x740 [ 755.010272] ? find_held_lock+0x36/0x1c0 [ 755.014594] ? lock_downgrade+0x8f0/0x8f0 [ 755.018774] ? rcu_is_watching+0x8c/0x150 [ 755.022935] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 755.027642] ? __fget+0x4d5/0x740 [ 755.031298] ? ksys_dup3+0x690/0x690 [ 755.035077] ? find_held_lock+0x36/0x1c0 [ 755.039183] ? kasan_check_write+0x14/0x20 [ 755.043438] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 755.048386] usbdev_ioctl+0x25/0x30 [ 755.052025] ? usbdev_compat_ioctl+0x30/0x30 [ 755.056452] do_vfs_ioctl+0x1de/0x1720 [ 755.060368] ? ioctl_preallocate+0x300/0x300 [ 755.064789] ? __fget_light+0x2f7/0x440 [ 755.068769] ? fget_raw+0x20/0x20 [ 755.072230] ? __sb_end_write+0xac/0xe0 [ 755.076217] ? fput+0x130/0x1a0 [ 755.079513] ? do_syscall_64+0x9a/0x820 [ 755.083500] ? do_syscall_64+0x9a/0x820 [ 755.087501] ? lockdep_hardirqs_on+0x421/0x5c0 [ 755.092112] ? security_file_ioctl+0x94/0xc0 [ 755.096542] ksys_ioctl+0xa9/0xd0 [ 755.099999] __x64_sys_ioctl+0x73/0xb0 [ 755.103912] do_syscall_64+0x1b9/0x820 [ 755.107832] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 755.113315] ? syscall_return_slowpath+0x5e0/0x5e0 [ 755.118304] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 755.123380] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 755.128399] ? recalc_sigpending_tsk+0x180/0x180 [ 755.133167] ? kasan_check_write+0x14/0x20 [ 755.137437] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 755.142302] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 755.147525] RIP: 0033:0x457099 [ 755.150720] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 755.169806] RSP: 002b:00007f0871553c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 755.177526] RAX: ffffffffffffffda RBX: 00007f08715546d4 RCX: 0000000000457099 [ 755.184817] RDX: 0000000020000240 RSI: 00000000c0185500 RDI: 0000000000000003 [ 755.192115] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 755.199408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 755.206752] R13: 00000000004ce8f0 R14: 00000000004c4e0b R15: 0000000000000000 21:32:01 executing program 6 (fault-call:3 fault-nth:1): r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x0, 0x1000000}) 21:32:01 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x2000000000000000}) 21:32:01 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x3000000}) 21:32:01 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r2) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) ioctl$NBD_CLEAR_QUE(r5, 0xab05) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000000080)={0x0, 0x3}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f0000000140)={r7, 0x5}, &(0x7f0000000240)=0xc) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 755.302129] usb usb9: usbfs: process 19034 (syz-executor4) did not claim interface 0 before use [ 755.317706] hfs: unable to load codepage "iso8259-4" [ 755.322960] hfs: unable to parse mount options 21:32:01 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000f80)='keyring\x00', &(0x7f0000000fc0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) keyctl$get_keyring_id(0x0, r2, 0x5) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r4) statfs(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)=""/127) keyctl$invalidate(0x15, r2) getrusage(0x1, &(0x7f0000000700)) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r3, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000c00)='msdos\x00', &(0x7f0000000c40)='./file0\x00', 0x2, 0x3, &(0x7f0000000e00)=[{&(0x7f0000000c80)="0eca6f14acfccd808f5935be330f46cefa0ec2c238ef8073c8c71eb7fc3b012af9b0883dce694408a0742f7b45fb83aeb74ee3232c", 0x35, 0x1}, {&(0x7f0000000cc0)="3acf954c0070da7fcf5f21476d7101e940b9fd15817a28c58d38db4fd1c13004c211f975d4432eab18708d47648b4250c27b9aea34f3917c72d5770db9405ff21f101f021f062cbf82cf13ddf8bf24b484a4486f3aa8c57d9e9e2a8bee67769fb866f005433629ef5bcd84811ab000eb503f58b17307d3b6dc9b990ffe7020e4a6d52cc97cb5449e8a9fe170f29b82e69115c11c222fc38d0602e45875a5bfbf96fe7d1c98b38a0d03523fbc75a3295ce7f1fa8430f8920da831a85f578c5747d75f97926369531e", 0xc8, 0xfffffffffffffffc}, {&(0x7f0000000dc0)="6abcee5683a4cfaaa21674797c7bb35eebb198d761", 0x15, 0x6}], 0x100000, &(0x7f0000000f00)={[{@nodots='nodots'}, {@dots='dots'}, {@fat=@uid={'uid', 0x3d, r6}}, {@fat=@umask={'umask', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r8, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r7, &(0x7f0000000140), 0x4000}]) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) [ 755.426396] hfs: unable to load codepage "iso8c59-4" [ 755.431626] hfs: unable to parse mount options 21:32:01 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x6800}) 21:32:01 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso88=9-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 755.466937] usb usb9: usbfs: process 19049 (syz-executor1) did not claim interface 0 before use [ 755.496843] usb usb9: check_ctrlrecip: process 19055 (syz-executor7) requesting ep 01 but needs 81 [ 755.506257] usb usb9: usbfs: process 19055 (syz-executor7) did not claim interface 0 before use 21:32:01 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x0, 0x1000000}) [ 755.587309] hfs: unable to load codepage "iso8c59-4" [ 755.592883] hfs: unable to parse mount options [ 755.622684] usb usb9: usbfs: process 19067 (syz-executor4) did not claim interface 0 before use 21:32:01 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000080)=0x403, 0x2a7) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x800000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000800)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) r4 = request_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)='\x00', 0xfffffffffffffffb) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x9, r4, r5) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) recvfrom(r6, &(0x7f0000000640)=""/97, 0x61, 0x40000000, &(0x7f0000000700)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x80) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f00000005c0)=[0x453, 0x39]) io_submit(r8, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r7, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 755.637108] usb usb9: check_ctrlrecip: process 19055 (syz-executor7) requesting ep 01 but needs 81 [ 755.646387] usb usb9: usbfs: process 19055 (syz-executor7) did not claim interface 0 before use 21:32:01 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8\n59-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:01 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x48000000}) [ 755.720959] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 755.720959] 21:32:01 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x500000000000000}) [ 755.766250] hfs: unable to load codepage "iso88=9-4" [ 755.771529] hfs: unable to parse mount options 21:32:01 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x5450, &(0x7f0000000240)={0x0, 0x1000000}) 21:32:02 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0xa}) [ 755.861255] hfs: unable to load codepage "iso88=9-4" [ 755.866629] hfs: unable to parse mount options [ 755.897142] usb usb9: usbfs: process 19101 (syz-executor1) did not claim interface 0 before use [ 755.913835] hfs: unable to load codepage "iso8 [ 755.913835] 59-4" [ 755.920668] hfs: unable to parse mount options [ 755.950366] usb usb9: usbfs: process 19105 (syz-executor4) did not claim interface 0 before use 21:32:02 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000f80)='keyring\x00', &(0x7f0000000fc0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) keyctl$get_keyring_id(0x0, r2, 0x5) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r4) statfs(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)=""/127) keyctl$invalidate(0x15, r2) getrusage(0x1, &(0x7f0000000700)) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r3, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000c00)='msdos\x00', &(0x7f0000000c40)='./file0\x00', 0x2, 0x3, &(0x7f0000000e00)=[{&(0x7f0000000c80)="0eca6f14acfccd808f5935be330f46cefa0ec2c238ef8073c8c71eb7fc3b012af9b0883dce694408a0742f7b45fb83aeb74ee3232c", 0x35, 0x1}, {&(0x7f0000000cc0)="3acf954c0070da7fcf5f21476d7101e940b9fd15817a28c58d38db4fd1c13004c211f975d4432eab18708d47648b4250c27b9aea34f3917c72d5770db9405ff21f101f021f062cbf82cf13ddf8bf24b484a4486f3aa8c57d9e9e2a8bee67769fb866f005433629ef5bcd84811ab000eb503f58b17307d3b6dc9b990ffe7020e4a6d52cc97cb5449e8a9fe170f29b82e69115c11c222fc38d0602e45875a5bfbf96fe7d1c98b38a0d03523fbc75a3295ce7f1fa8430f8920da831a85f578c5747d75f97926369531e", 0xc8, 0xfffffffffffffffc}, {&(0x7f0000000dc0)="6abcee5683a4cfaaa21674797c7bb35eebb198d761", 0x15, 0x6}], 0x100000, &(0x7f0000000f00)={[{@nodots='nodots'}, {@dots='dots'}, {@fat=@uid={'uid', 0x3d, r6}}, {@fat=@umask={'umask', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) 21:32:02 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso88#9-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:02 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x4c00}) 21:32:02 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x6c}) [ 756.038386] hfs: unable to load codepage "iso8 [ 756.038386] 59-4" [ 756.042319] usb usb9: check_ctrlrecip: process 19114 (syz-executor7) requesting ep 01 but needs 81 [ 756.045056] hfs: unable to parse mount options [ 756.054218] usb usb9: usbfs: process 19114 (syz-executor7) did not claim interface 0 before use 21:32:02 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x40085511, &(0x7f0000000240)={0x0, 0x1000000}) [ 756.193444] hfs: unable to load codepage "iso88#9-4" [ 756.198728] hfs: unable to parse mount options [ 756.215286] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 756.215286] 21:32:02 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8259-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 756.241595] usb usb9: usbfs: process 19136 (syz-executor4) did not claim interface 0 before use [ 756.264072] usb usb9: usbfs: process 19138 (syz-executor1) did not claim interface 0 before use 21:32:02 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0xa00000000000000}) [ 756.309443] hfs: unable to load codepage "iso88#9-4" [ 756.314687] hfs: unable to parse mount options 21:32:02 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x3}) 21:32:02 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x6000000}) 21:32:02 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x0, 0x1000000}) [ 756.482216] hfs: unable to load codepage "iso8259-4" [ 756.487448] hfs: unable to parse mount options [ 756.520560] usb usb9: usbfs: process 19158 (syz-executor4) did not claim interface 0 before use [ 756.531785] usb usb9: check_ctrlrecip: process 19165 (syz-executor7) requesting ep 01 but needs 81 [ 756.541190] usb usb9: usbfs: process 19165 (syz-executor7) did not claim interface 0 before use [ 756.552875] usb usb9: usbfs: process 19164 (syz-executor1) did not claim interface 0 before use [ 756.612865] hfs: unable to load codepage "iso8259-4" [ 756.618119] hfs: unable to parse mount options 21:32:02 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540)=0x0, &(0x7f0000000580)) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:32:02 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x5421, &(0x7f0000000240)={0x0, 0x1000000}) 21:32:02 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso88+9-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:02 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x400000000000000}) 21:32:02 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x700}) 21:32:02 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x6000000000000000}) 21:32:02 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000f80)='keyring\x00', &(0x7f0000000fc0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) keyctl$get_keyring_id(0x0, r2, 0x5) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r4) statfs(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)=""/127) keyctl$invalidate(0x15, r2) getrusage(0x1, &(0x7f0000000700)) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r3, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000c00)='msdos\x00', &(0x7f0000000c40)='./file0\x00', 0x2, 0x3, &(0x7f0000000e00)=[{&(0x7f0000000c80)="0eca6f14acfccd808f5935be330f46cefa0ec2c238ef8073c8c71eb7fc3b012af9b0883dce694408a0742f7b45fb83aeb74ee3232c", 0x35, 0x1}, {&(0x7f0000000cc0)="3acf954c0070da7fcf5f21476d7101e940b9fd15817a28c58d38db4fd1c13004c211f975d4432eab18708d47648b4250c27b9aea34f3917c72d5770db9405ff21f101f021f062cbf82cf13ddf8bf24b484a4486f3aa8c57d9e9e2a8bee67769fb866f005433629ef5bcd84811ab000eb503f58b17307d3b6dc9b990ffe7020e4a6d52cc97cb5449e8a9fe170f29b82e69115c11c222fc38d0602e45875a5bfbf96fe7d1c98b38a0d03523fbc75a3295ce7f1fa8430f8920da831a85f578c5747d75f97926369531e", 0xc8, 0xfffffffffffffffc}, {&(0x7f0000000dc0)="6abcee5683a4cfaaa21674797c7bb35eebb198d761", 0x15, 0x6}], 0x100000, &(0x7f0000000f00)={[{@nodots='nodots'}, {@dots='dots'}, {@fat=@uid={'uid', 0x3d, r6}}, {@fat=@umask={'umask', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) 21:32:02 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso88#9-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 756.755950] usb usb9: usbfs: process 19188 (syz-executor4) did not claim interface 0 before use [ 756.793134] usb usb9: check_ctrlrecip: process 19198 (syz-executor7) requesting ep 01 but needs 81 [ 756.802440] usb usb9: usbfs: process 19198 (syz-executor7) did not claim interface 0 before use [ 756.816169] usb usb9: usbfs: process 19202 (syz-executor1) did not claim interface 0 before use [ 756.844157] hfs: unable to load codepage "iso88+9-4" [ 756.849432] hfs: unable to parse mount options 21:32:03 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x80045510, &(0x7f0000000240)={0x0, 0x1000000}) [ 756.860407] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 756.860407] 21:32:03 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x7400000000000000}) [ 756.942416] hfs: unable to load codepage "iso88+9-4" [ 756.947701] hfs: unable to parse mount options [ 756.964625] hfs: unable to load codepage "iso88#9-4" [ 756.969885] hfs: unable to parse mount options 21:32:03 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x6000}) 21:32:03 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x4000}) 21:32:03 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x4000010000400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r5, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:32:03 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso88<9-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:03 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000f80)='keyring\x00', &(0x7f0000000fc0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) keyctl$get_keyring_id(0x0, r2, 0x5) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r4) statfs(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)=""/127) keyctl$invalidate(0x15, r2) getrusage(0x1, &(0x7f0000000700)) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r3, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000c00)='msdos\x00', &(0x7f0000000c40)='./file0\x00', 0x2, 0x3, &(0x7f0000000e00)=[{&(0x7f0000000c80)="0eca6f14acfccd808f5935be330f46cefa0ec2c238ef8073c8c71eb7fc3b012af9b0883dce694408a0742f7b45fb83aeb74ee3232c", 0x35, 0x1}, {&(0x7f0000000cc0)="3acf954c0070da7fcf5f21476d7101e940b9fd15817a28c58d38db4fd1c13004c211f975d4432eab18708d47648b4250c27b9aea34f3917c72d5770db9405ff21f101f021f062cbf82cf13ddf8bf24b484a4486f3aa8c57d9e9e2a8bee67769fb866f005433629ef5bcd84811ab000eb503f58b17307d3b6dc9b990ffe7020e4a6d52cc97cb5449e8a9fe170f29b82e69115c11c222fc38d0602e45875a5bfbf96fe7d1c98b38a0d03523fbc75a3295ce7f1fa8430f8920da831a85f578c5747d75f97926369531e", 0xc8, 0xfffffffffffffffc}, {&(0x7f0000000dc0)="6abcee5683a4cfaaa21674797c7bb35eebb198d761", 0x15, 0x6}], 0x100000, &(0x7f0000000f00)={[{@nodots='nodots'}, {@dots='dots'}, {@fat=@uid={'uid', 0x3d, r6}}, {@fat=@umask={'umask', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) [ 757.098555] hfs: unable to load codepage "iso88#9-4" [ 757.103796] hfs: unable to parse mount options [ 757.130508] usb usb9: usbfs: process 19236 (syz-executor4) did not claim interface 0 before use 21:32:03 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0045878, &(0x7f0000000240)={0x0, 0x1000000}) [ 757.182575] usb usb9: usbfs: process 19240 (syz-executor1) did not claim interface 0 before use 21:32:03 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso88<9-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 757.225611] usb usb9: check_ctrlrecip: process 19247 (syz-executor7) requesting ep 01 but needs 81 [ 757.234884] usb usb9: usbfs: process 19247 (syz-executor7) did not claim interface 0 before use 21:32:03 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x1000000}) [ 757.284578] hfs: unable to load codepage "iso88<9-4" [ 757.289871] hfs: unable to parse mount options 21:32:03 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000700)=""/168) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f0000000080)={{0x1, 0x8, 0x1ff, 0x1, 0x0, 0x916}, 0x1}) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000140), 0x4000}]) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 21:32:03 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x4c}) 21:32:03 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x500}) [ 757.376986] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 757.376986] [ 757.389779] hfs: unable to load codepage "iso88<9-4" [ 757.395051] hfs: unable to parse mount options [ 757.441962] usb usb9: usbfs: process 19275 (syz-executor4) did not claim interface 0 before use [ 757.481858] hfs: unable to load codepage "iso88<9-4" [ 757.487125] hfs: unable to parse mount options 21:32:03 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000f80)='keyring\x00', &(0x7f0000000fc0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) keyctl$get_keyring_id(0x0, r2, 0x5) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r4) statfs(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)=""/127) keyctl$invalidate(0x15, r2) getrusage(0x1, &(0x7f0000000700)) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r3, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000c00)='msdos\x00', &(0x7f0000000c40)='./file0\x00', 0x2, 0x3, &(0x7f0000000e00)=[{&(0x7f0000000c80)="0eca6f14acfccd808f5935be330f46cefa0ec2c238ef8073c8c71eb7fc3b012af9b0883dce694408a0742f7b45fb83aeb74ee3232c", 0x35, 0x1}, {&(0x7f0000000cc0)="3acf954c0070da7fcf5f21476d7101e940b9fd15817a28c58d38db4fd1c13004c211f975d4432eab18708d47648b4250c27b9aea34f3917c72d5770db9405ff21f101f021f062cbf82cf13ddf8bf24b484a4486f3aa8c57d9e9e2a8bee67769fb866f005433629ef5bcd84811ab000eb503f58b17307d3b6dc9b990ffe7020e4a6d52cc97cb5449e8a9fe170f29b82e69115c11c222fc38d0602e45875a5bfbf96fe7d1c98b38a0d03523fbc75a3295ce7f1fa8430f8920da831a85f578c5747d75f97926369531e", 0xc8, 0xfffffffffffffffc}, {&(0x7f0000000dc0)="6abcee5683a4cfaaa21674797c7bb35eebb198d761", 0x15, 0x6}], 0x100000, &(0x7f0000000f00)={[{@nodots='nodots'}, {@dots='dots'}, {@fat=@uid={'uid', 0x3d, r6}}, {@fat=@umask={'umask', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) 21:32:03 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso88\n9-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:03 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x2000}) 21:32:03 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x551f, &(0x7f0000000240)={0x0, 0x1000000}) [ 757.565464] usb usb9: usbfs: process 19288 (syz-executor1) did not claim interface 0 before use [ 757.570544] hfs: unable to load codepage "iso88<9-4" [ 757.579621] hfs: unable to parse mount options [ 757.593751] usb usb9: check_ctrlrecip: process 19294 (syz-executor7) requesting ep 01 but needs 81 [ 757.603145] usb usb9: usbfs: process 19294 (syz-executor7) did not claim interface 0 before use 21:32:03 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso88+9-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:03 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x7a00000000000000}) 21:32:03 executing program 5 (fault-call:6 fault-nth:0): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x1, 0x0, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5c, &(0x7f0000000000), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 757.759127] usb usb9: usbfs: process 19313 (syz-executor4) did not claim interface 0 before use 21:32:04 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f0000000240)={0x0, 0x1000000}) 21:32:04 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x300000000000000}) 21:32:04 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0xa00}) [ 757.826275] hfs: unable to load codepage "iso88 [ 757.826275] 9-4" [ 757.832956] hfs: unable to parse mount options [ 757.843265] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 757.843265] [ 757.925179] hfs: unable to load codepage "iso88+9-4" [ 757.930515] hfs: unable to parse mount options [ 757.956456] usb usb9: usbfs: process 19331 (syz-executor1) did not claim interface 0 before use [ 757.989385] hfs: unable to load codepage "iso88 [ 757.989385] 9-4" [ 757.996120] hfs: unable to parse mount options [ 758.070766] usb usb9: usbfs: process 19350 (syz-executor4) did not claim interface 0 before use [ 758.078480] hfs: unable to load codepage "iso88+9-4" [ 758.084965] hfs: unable to parse mount options [ 758.085786] usb usb9: check_ctrlrecip: process 19349 (syz-executor7) requesting ep 01 but needs 81 [ 758.098899] usb usb9: usbfs: process 19349 (syz-executor7) did not claim interface 0 before use [ 758.119578] FAULT_INJECTION: forcing a failure. [ 758.119578] name failslab, interval 1, probability 0, space 0, times 0 [ 758.130940] CPU: 1 PID: 19352 Comm: syz-executor5 Not tainted 4.19.0-rc2+ #220 [ 758.138364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 758.147746] Call Trace: [ 758.150393] dump_stack+0x1c9/0x2b4 [ 758.154062] ? dump_stack_print_info.cold.2+0x52/0x52 [ 758.159298] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 758.164481] should_fail.cold.4+0xa/0x11 21:32:04 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso88-9-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:04 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x6}) 21:32:04 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x4c00000000000000}) 21:32:04 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x80045503, &(0x7f0000000240)={0x0, 0x1000000}) 21:32:04 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0xffffff7f00000000}) [ 758.168585] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 758.173724] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 758.178859] ? add_timer+0x5f1/0x1390 [ 758.182685] ? print_usage_bug+0xc0/0xc0 [ 758.186780] ? graph_lock+0x170/0x170 [ 758.190617] ? mod_timer+0x1340/0x1340 [ 758.194536] ? find_held_lock+0x36/0x1c0 [ 758.198762] ? __lock_is_held+0xb5/0x140 [ 758.202862] ? check_same_owner+0x340/0x340 [ 758.207223] ? rcu_note_context_switch+0x680/0x680 [ 758.212186] __should_failslab+0x124/0x180 [ 758.216456] should_failslab+0x9/0x14 [ 758.220295] kmem_cache_alloc+0x29c/0x710 [ 758.224502] ? handle_wrmsr+0x940/0x940 [ 758.228508] ? mark_held_locks+0xc9/0x160 [ 758.232691] mmu_topup_memory_caches+0xf7/0x3a0 [ 758.237404] kvm_mmu_load+0x21/0x1260 [ 758.241236] ? kasan_check_write+0x14/0x20 [ 758.245499] ? do_raw_spin_lock+0xc1/0x200 [ 758.249771] vcpu_enter_guest+0x3c8b/0x61a0 [ 758.254138] ? kvm_set_msr_common+0x2680/0x2680 [ 758.258846] ? vmx_vcpu_load+0xad2/0xfe0 [ 758.262942] ? handle_dr+0x8c0/0x8c0 [ 758.266694] ? graph_lock+0x170/0x170 [ 758.270548] ? __lock_is_held+0xb5/0x140 [ 758.274641] ? lock_acquire+0x1e4/0x4f0 [ 758.278646] ? kvm_arch_vcpu_ioctl_run+0x234/0x16d0 [ 758.283690] ? lock_release+0x9f0/0x9f0 [ 758.287802] ? kvm_arch_vcpu_ioctl_set_fpu+0x340/0x340 [ 758.293119] ? kvm_arch_dev_ioctl+0x610/0x610 [ 758.297644] ? preempt_notifier_dec+0x20/0x20 [ 758.302181] kvm_arch_vcpu_ioctl_run+0x373/0x16d0 [ 758.307061] ? kvm_arch_vcpu_ioctl_run+0x373/0x16d0 [ 758.312161] kvm_vcpu_ioctl+0x7b8/0x1280 [ 758.316258] ? kvm_uevent_notify_change.part.32+0x440/0x440 [ 758.321997] ? find_held_lock+0x36/0x1c0 [ 758.326095] ? lock_downgrade+0x8f0/0x8f0 [ 758.330573] ? kasan_check_read+0x11/0x20 [ 758.334749] ? rcu_is_watching+0x8c/0x150 [ 758.339008] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 758.343843] ? __fget+0x4d5/0x740 [ 758.347354] ? ksys_dup3+0x690/0x690 [ 758.351115] ? find_held_lock+0x36/0x1c0 [ 758.355203] ? kasan_check_write+0x14/0x20 [ 758.359471] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 758.364451] ? kvm_uevent_notify_change.part.32+0x440/0x440 21:32:04 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000f80)='keyring\x00', &(0x7f0000000fc0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) keyctl$get_keyring_id(0x0, r2, 0x5) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r4) statfs(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)=""/127) keyctl$invalidate(0x15, r2) getrusage(0x1, &(0x7f0000000700)) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r3, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000c00)='msdos\x00', &(0x7f0000000c40)='./file0\x00', 0x2, 0x3, &(0x7f0000000e00)=[{&(0x7f0000000c80)="0eca6f14acfccd808f5935be330f46cefa0ec2c238ef8073c8c71eb7fc3b012af9b0883dce694408a0742f7b45fb83aeb74ee3232c", 0x35, 0x1}, {&(0x7f0000000cc0)="3acf954c0070da7fcf5f21476d7101e940b9fd15817a28c58d38db4fd1c13004c211f975d4432eab18708d47648b4250c27b9aea34f3917c72d5770db9405ff21f101f021f062cbf82cf13ddf8bf24b484a4486f3aa8c57d9e9e2a8bee67769fb866f005433629ef5bcd84811ab000eb503f58b17307d3b6dc9b990ffe7020e4a6d52cc97cb5449e8a9fe170f29b82e69115c11c222fc38d0602e45875a5bfbf96fe7d1c98b38a0d03523fbc75a3295ce7f1fa8430f8920da831a85f578c5747d75f97926369531e", 0xc8, 0xfffffffffffffffc}, {&(0x7f0000000dc0)="6abcee5683a4cfaaa21674797c7bb35eebb198d761", 0x15, 0x6}], 0x100000, &(0x7f0000000f00)={[{@nodots='nodots'}, {@dots='dots'}, {@fat=@uid={'uid', 0x3d, r6}}, {@fat=@umask={'umask', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000040)) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) [ 758.370186] do_vfs_ioctl+0x1de/0x1720 [ 758.374090] ? __lock_is_held+0xb5/0x140 [ 758.378182] ? ioctl_preallocate+0x300/0x300 [ 758.382617] ? __fget_light+0x2f7/0x440 [ 758.386618] ? fget_raw+0x20/0x20 [ 758.390094] ? __sb_end_write+0xac/0xe0 [ 758.394098] ? fput+0x130/0x1a0 [ 758.397412] ? do_syscall_64+0x9a/0x820 [ 758.401409] ? do_syscall_64+0x9a/0x820 [ 758.405411] ? lockdep_hardirqs_on+0x421/0x5c0 [ 758.410020] ? security_file_ioctl+0x94/0xc0 [ 758.414459] ksys_ioctl+0xa9/0xd0 [ 758.417938] __x64_sys_ioctl+0x73/0xb0 [ 758.421850] do_syscall_64+0x1b9/0x820 [ 758.425763] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 758.431149] ? syscall_return_slowpath+0x5e0/0x5e0 [ 758.436114] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 758.440980] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 758.446020] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 758.451066] ? prepare_exit_to_usermode+0x291/0x3b0 [ 758.456133] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 758.461011] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 758.466221] RIP: 0033:0x457099 [ 758.469438] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 758.488385] RSP: 002b:00007f0811f2ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 758.496122] RAX: ffffffffffffffda RBX: 00007f0811f2f6d4 RCX: 0000000000457099 [ 758.503411] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000006 [ 758.511913] RBP: 0000000000930140 R08: 0000000000000000 R09: 0000000000000000 [ 758.519199] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 758.526484] R13: 00000000004cf460 R14: 00000000004c5786 R15: 0000000000000000 21:32:04 executing program 5 (fault-call:6 fault-nth:1): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x1, 0x0, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5c, &(0x7f0000000000), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:32:04 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso88-9-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 758.650404] usb usb9: usbfs: process 19365 (syz-executor4) did not claim interface 0 before use [ 758.665702] usb usb9: usbfs: process 19372 (syz-executor1) did not claim interface 0 before use [ 758.697718] usb usb9: check_ctrlrecip: process 19378 (syz-executor7) requesting ep 01 but needs 81 [ 758.707413] usb usb9: usbfs: process 19378 (syz-executor7) did not claim interface 0 before use [ 758.765113] hfs: unable to load codepage "iso88-9-4" [ 758.770486] hfs: unable to parse mount options [ 758.775813] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 758.775813] 21:32:04 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x550b, &(0x7f0000000240)={0x0, 0x1000000}) 21:32:05 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x6c000000}) 21:32:05 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x4c00}) [ 758.835193] FAULT_INJECTION: forcing a failure. [ 758.835193] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 758.847047] CPU: 0 PID: 19383 Comm: syz-executor5 Not tainted 4.19.0-rc2+ #220 [ 758.854430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 758.863799] Call Trace: [ 758.866409] dump_stack+0x1c9/0x2b4 [ 758.870065] ? dump_stack_print_info.cold.2+0x52/0x52 [ 758.875277] ? perf_trace_lock+0xde/0x920 [ 758.879482] should_fail.cold.4+0xa/0x11 [ 758.883589] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 758.888730] ? perf_trace_lock+0xde/0x920 [ 758.892918] ? zap_class+0x740/0x740 [ 758.896657] ? rcu_is_watching+0x8c/0x150 [ 758.900852] ? find_held_lock+0x36/0x1c0 [ 758.904938] ? graph_lock+0x170/0x170 [ 758.908772] ? lock_downgrade+0x8f0/0x8f0 [ 758.912979] __alloc_pages_nodemask+0x365/0xd10 [ 758.917684] ? __alloc_pages_slowpath+0x2cb0/0x2cb0 [ 758.922729] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 758.927437] ? __lock_is_held+0xb5/0x140 [ 758.931540] ? trace_hardirqs_off+0xb8/0x2b0 [ 758.935977] cache_grow_begin+0x91/0x710 [ 758.940078] kmem_cache_alloc+0x63a/0x710 [ 758.944251] ? handle_wrmsr+0x940/0x940 [ 758.948253] ? print_usage_bug+0xc0/0xc0 [ 758.952361] mmu_topup_memory_caches+0xf7/0x3a0 [ 758.957069] kvm_mmu_load+0x21/0x1260 [ 758.959396] usb usb9: usbfs: process 19403 (syz-executor4) did not claim interface 0 before use [ 758.960895] ? check_same_owner+0x340/0x340 [ 758.960923] ? rcu_note_context_switch+0x680/0x680 [ 758.960954] vcpu_enter_guest+0x3c8b/0x61a0 21:32:05 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000240)={0x0, 0x1000000}) [ 758.960991] ? kvm_set_msr_common+0x2680/0x2680 [ 758.970319] usb usb9: usbfs: process 19404 (syz-executor1) did not claim interface 0 before use [ 758.974331] ? zap_class+0x740/0x740 [ 758.974350] ? vmx_vcpu_load+0xad2/0xfe0 [ 758.974370] ? handle_dr+0x8c0/0x8c0 [ 758.974385] ? graph_lock+0x170/0x170 [ 758.974403] ? perf_trace_lock+0xde/0x920 [ 758.974434] ? __lock_is_held+0xb5/0x140 [ 758.974470] ? lock_acquire+0x1e4/0x4f0 [ 759.024769] ? kvm_arch_vcpu_ioctl_run+0x234/0x16d0 [ 759.029814] ? lock_release+0x9f0/0x9f0 21:32:05 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x1000000}) 21:32:05 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x6000000000000000}) [ 759.033812] ? kvm_arch_vcpu_ioctl_set_fpu+0x340/0x340 [ 759.039116] ? kvm_arch_dev_ioctl+0x610/0x610 [ 759.043646] ? preempt_notifier_dec+0x20/0x20 [ 759.048183] kvm_arch_vcpu_ioctl_run+0x373/0x16d0 [ 759.053051] ? kvm_arch_vcpu_ioctl_run+0x373/0x16d0 [ 759.058222] kvm_vcpu_ioctl+0x7b8/0x1280 [ 759.062317] ? kvm_uevent_notify_change.part.32+0x440/0x440 [ 759.068090] ? find_held_lock+0x36/0x1c0 [ 759.072225] ? lock_downgrade+0x8f0/0x8f0 [ 759.076417] ? rcu_is_watching+0x8c/0x150 [ 759.080594] ? rcu_cleanup_dead_rnp+0x200/0x200 21:32:05 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x80045518, &(0x7f0000000240)={0x0, 0x1000000}) [ 759.085313] ? __fget+0x4d5/0x740 [ 759.088858] ? ksys_dup3+0x690/0x690 [ 759.092596] ? find_held_lock+0x36/0x1c0 [ 759.096693] ? kasan_check_write+0x14/0x20 [ 759.100957] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 759.105922] ? kvm_uevent_notify_change.part.32+0x440/0x440 [ 759.111775] do_vfs_ioctl+0x1de/0x1720 [ 759.114098] usb usb9: usbfs: process 19411 (syz-executor4) did not claim interface 0 before use [ 759.115696] ? ioctl_preallocate+0x300/0x300 [ 759.115715] ? __fget_light+0x2f7/0x440 [ 759.115734] ? fget_raw+0x20/0x20 [ 759.115753] ? __sb_end_write+0xac/0xe0 [ 759.115772] ? fput+0x130/0x1a0 [ 759.115788] ? do_syscall_64+0x9a/0x820 [ 759.115809] ? do_syscall_64+0x9a/0x820 [ 759.125538] usb usb9: usbfs: process 19410 (syz-executor1) did not claim interface 0 before use [ 759.129077] ? lockdep_hardirqs_on+0x421/0x5c0 [ 759.129100] ? security_file_ioctl+0x94/0xc0 [ 759.129120] ksys_ioctl+0xa9/0xd0 [ 759.129142] __x64_sys_ioctl+0x73/0xb0 [ 759.129161] do_syscall_64+0x1b9/0x820 [ 759.129184] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 21:32:05 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x74000000}) [ 759.186442] ? syscall_return_slowpath+0x5e0/0x5e0 [ 759.191400] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 759.196268] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 759.201316] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 759.206406] ? prepare_exit_to_usermode+0x291/0x3b0 [ 759.211459] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 759.216384] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 759.221611] RIP: 0033:0x457099 [ 759.224830] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 759.243762] RSP: 002b:00007f0811f4fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 759.251067] usb usb9: usbfs: process 19416 (syz-executor1) did not claim interface 0 before use [ 759.251501] RAX: ffffffffffffffda RBX: 00007f0811f506d4 RCX: 0000000000457099 [ 759.251511] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000006 [ 759.251521] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 759.251531] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 759.251541] R13: 00000000004cf460 R14: 00000000004c5786 R15: 0000000000000001 [ 759.262180] hfs: unable to load codepage "iso88-9-4" [ 759.302635] hfs: unable to parse mount options [ 759.345606] hfs: unable to load codepage "iso88-9-4" [ 759.350964] hfs: unable to parse mount options [ 759.444504] hfs: unable to load codepage "iso88-9-4" [ 759.449747] hfs: unable to parse mount options 21:32:05 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8809-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:05 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0xffffff7f}) 21:32:05 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x41045508, &(0x7f0000000240)={0x0, 0x1000000}) 21:32:05 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x20000000}) 21:32:05 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000f80)='keyring\x00', &(0x7f0000000fc0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) keyctl$get_keyring_id(0x0, r2, 0x5) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r4) statfs(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)=""/127) keyctl$invalidate(0x15, r2) getrusage(0x1, &(0x7f0000000700)) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r3, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000c00)='msdos\x00', &(0x7f0000000c40)='./file0\x00', 0x2, 0x3, &(0x7f0000000e00)=[{&(0x7f0000000c80)="0eca6f14acfccd808f5935be330f46cefa0ec2c238ef8073c8c71eb7fc3b012af9b0883dce694408a0742f7b45fb83aeb74ee3232c", 0x35, 0x1}, {&(0x7f0000000cc0)="3acf954c0070da7fcf5f21476d7101e940b9fd15817a28c58d38db4fd1c13004c211f975d4432eab18708d47648b4250c27b9aea34f3917c72d5770db9405ff21f101f021f062cbf82cf13ddf8bf24b484a4486f3aa8c57d9e9e2a8bee67769fb866f005433629ef5bcd84811ab000eb503f58b17307d3b6dc9b990ffe7020e4a6d52cc97cb5449e8a9fe170f29b82e69115c11c222fc38d0602e45875a5bfbf96fe7d1c98b38a0d03523fbc75a3295ce7f1fa8430f8920da831a85f578c5747d75f97926369531e", 0xc8, 0xfffffffffffffffc}, {&(0x7f0000000dc0)="6abcee5683a4cfaaa21674797c7bb35eebb198d761", 0x15, 0x6}], 0x100000, &(0x7f0000000f00)={[{@nodots='nodots'}, {@dots='dots'}, {@fat=@uid={'uid', 0x3d, r6}}, {@fat=@umask={'umask', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) 21:32:05 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0xa00000000000000}) [ 759.638753] usb usb9: usbfs: process 19448 (syz-executor1) did not claim interface 0 before use [ 759.676844] usb usb9: usbfs: process 19449 (syz-executor4) did not claim interface 0 before use 21:32:05 executing program 5 (fault-call:6 fault-nth:2): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x1, 0x0, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5c, &(0x7f0000000000), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:32:05 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8809-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 759.692169] usb usb9: check_ctrlrecip: process 19451 (syz-executor7) requesting ep 01 but needs 81 [ 759.701467] usb usb9: usbfs: process 19451 (syz-executor7) did not claim interface 0 before use [ 759.711099] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 759.711099] [ 759.723818] hfs: unable to load codepage "iso8809-4" [ 759.729061] hfs: unable to parse mount options 21:32:05 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x5452, &(0x7f0000000240)={0x0, 0x1000000}) 21:32:05 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x68000000}) 21:32:05 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0xa00}) [ 759.816990] hfs: unable to load codepage "iso8809-4" [ 759.822421] hfs: unable to parse mount options 21:32:06 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x48000000}) [ 759.874437] hfs: unable to load codepage "iso8809-4" [ 759.879683] hfs: unable to parse mount options 21:32:06 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000f80)='keyring\x00', &(0x7f0000000fc0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) keyctl$get_keyring_id(0x0, r2, 0x5) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r4) statfs(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)=""/127) keyctl$invalidate(0x15, r2) getrusage(0x1, &(0x7f0000000700)) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) fstat(r3, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000c00)='msdos\x00', &(0x7f0000000c40)='./file0\x00', 0x2, 0x3, &(0x7f0000000e00)=[{&(0x7f0000000c80)="0eca6f14acfccd808f5935be330f46cefa0ec2c238ef8073c8c71eb7fc3b012af9b0883dce694408a0742f7b45fb83aeb74ee3232c", 0x35, 0x1}, {&(0x7f0000000cc0)="3acf954c0070da7fcf5f21476d7101e940b9fd15817a28c58d38db4fd1c13004c211f975d4432eab18708d47648b4250c27b9aea34f3917c72d5770db9405ff21f101f021f062cbf82cf13ddf8bf24b484a4486f3aa8c57d9e9e2a8bee67769fb866f005433629ef5bcd84811ab000eb503f58b17307d3b6dc9b990ffe7020e4a6d52cc97cb5449e8a9fe170f29b82e69115c11c222fc38d0602e45875a5bfbf96fe7d1c98b38a0d03523fbc75a3295ce7f1fa8430f8920da831a85f578c5747d75f97926369531e", 0xc8, 0xfffffffffffffffc}, {&(0x7f0000000dc0)="6abcee5683a4cfaaa21674797c7bb35eebb198d761", 0x15, 0x6}], 0x100000, &(0x7f0000000f00)={[{@nodots='nodots'}, {@dots='dots'}, {@fat=@uid={'uid', 0x3d, r5}}, {@fat=@umask={'umask', 0x3d, 0x100000000}}]}) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) [ 759.937669] hfs: unable to load codepage "iso8809-4" [ 759.942977] hfs: unable to parse mount options [ 759.987875] usb usb9: usbfs: process 19493 (syz-executor4) did not claim interface 0 before use [ 759.998787] usb usb9: usbfs: process 19494 (syz-executor1) did not claim interface 0 before use 21:32:06 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso885<-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:06 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105502, &(0x7f0000000240)={0x0, 0x1000000}) 21:32:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x1, 0x0, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5c, &(0x7f0000000000), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:32:06 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x20000000}) [ 760.091392] usb usb9: check_ctrlrecip: process 19501 (syz-executor7) requesting ep 01 but needs 81 [ 760.100659] usb usb9: usbfs: process 19501 (syz-executor7) did not claim interface 0 before use 21:32:06 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x74}) 21:32:06 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso88=9-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 760.205228] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 760.205228] [ 760.287242] usb usb9: usbfs: process 19527 (syz-executor4) did not claim interface 0 before use [ 760.314766] usb usb9: usbfs: process 19531 (syz-executor1) did not claim interface 0 before use 21:32:06 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x0, 0x1000000}) 21:32:06 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x300}) [ 760.339574] hfs: unable to load codepage "iso885<-4" [ 760.344850] hfs: unable to parse mount options [ 760.377456] hfs: unable to load codepage "iso88=9-4" [ 760.382702] hfs: unable to parse mount options 21:32:06 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x60}) 21:32:06 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000f80)='keyring\x00', &(0x7f0000000fc0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) keyctl$get_keyring_id(0x0, r2, 0x5) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r4) statfs(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)=""/127) keyctl$invalidate(0x15, r2) getrusage(0x1, &(0x7f0000000700)) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) fstat(r3, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000c00)='msdos\x00', &(0x7f0000000c40)='./file0\x00', 0x2, 0x3, &(0x7f0000000e00)=[{&(0x7f0000000c80)="0eca6f14acfccd808f5935be330f46cefa0ec2c238ef8073c8c71eb7fc3b012af9b0883dce694408a0742f7b45fb83aeb74ee3232c", 0x35, 0x1}, {&(0x7f0000000cc0)="3acf954c0070da7fcf5f21476d7101e940b9fd15817a28c58d38db4fd1c13004c211f975d4432eab18708d47648b4250c27b9aea34f3917c72d5770db9405ff21f101f021f062cbf82cf13ddf8bf24b484a4486f3aa8c57d9e9e2a8bee67769fb866f005433629ef5bcd84811ab000eb503f58b17307d3b6dc9b990ffe7020e4a6d52cc97cb5449e8a9fe170f29b82e69115c11c222fc38d0602e45875a5bfbf96fe7d1c98b38a0d03523fbc75a3295ce7f1fa8430f8920da831a85f578c5747d75f97926369531e", 0xc8, 0xfffffffffffffffc}, {&(0x7f0000000dc0)="6abcee5683a4cfaaa21674797c7bb35eebb198d761", 0x15, 0x6}], 0x100000, &(0x7f0000000f00)={[{@nodots='nodots'}, {@dots='dots'}, {@fat=@uid={'uid', 0x3d, r5}}, {@fat=@umask={'umask', 0x3d, 0x100000000}}]}) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) 21:32:06 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x60}) [ 760.526247] hfs: unable to load codepage "iso885<-4" [ 760.527451] usb usb9: check_ctrlrecip: process 19549 (syz-executor7) requesting ep 01 but needs 81 [ 760.531528] hfs: unable to parse mount options [ 760.545425] usb usb9: usbfs: process 19549 (syz-executor7) did not claim interface 0 before use 21:32:06 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso88\n9-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 760.602803] usb usb9: usbfs: process 19558 (syz-executor1) did not claim interface 0 before use [ 760.613816] usb usb9: usbfs: process 19557 (syz-executor4) did not claim interface 0 before use 21:32:06 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x80085504, &(0x7f0000000240)={0x0, 0x1000000}) 21:32:06 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso885=-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:06 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x5, 0x800) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x1, 0x0, &(0x7f0000000000), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x2000, 0x0) write$FUSE_POLL(r3, &(0x7f0000000000)={0x18, 0x0, 0x3, {0x3}}, 0x18) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5c, &(0x7f0000000000), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 760.703639] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 760.703639] 21:32:06 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x7000000}) 21:32:06 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x6}) [ 760.779567] hfs: unable to load codepage "iso88 [ 760.779567] 9-4" [ 760.786270] hfs: unable to parse mount options [ 760.800548] usb usb9: usbfs: process 19579 (syz-executor6) did not claim interface 0 before use 21:32:07 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x3}) [ 760.845260] hfs: unable to load codepage "iso885=-4" [ 760.850546] hfs: unable to parse mount options [ 760.907867] hfs: unable to load codepage "iso88 [ 760.907867] 9-4" [ 760.914653] hfs: unable to parse mount options [ 760.924729] usb usb9: usbfs: process 19592 (syz-executor4) did not claim interface 0 before use 21:32:07 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105500, &(0x7f0000000240)={0x0, 0x1000000}) 21:32:07 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000f80)='keyring\x00', &(0x7f0000000fc0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) keyctl$get_keyring_id(0x0, r2, 0x5) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r4) statfs(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)=""/127) keyctl$invalidate(0x15, r2) getrusage(0x1, &(0x7f0000000700)) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) fstat(r3, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000c00)='msdos\x00', &(0x7f0000000c40)='./file0\x00', 0x2, 0x3, &(0x7f0000000e00)=[{&(0x7f0000000c80)="0eca6f14acfccd808f5935be330f46cefa0ec2c238ef8073c8c71eb7fc3b012af9b0883dce694408a0742f7b45fb83aeb74ee3232c", 0x35, 0x1}, {&(0x7f0000000cc0)="3acf954c0070da7fcf5f21476d7101e940b9fd15817a28c58d38db4fd1c13004c211f975d4432eab18708d47648b4250c27b9aea34f3917c72d5770db9405ff21f101f021f062cbf82cf13ddf8bf24b484a4486f3aa8c57d9e9e2a8bee67769fb866f005433629ef5bcd84811ab000eb503f58b17307d3b6dc9b990ffe7020e4a6d52cc97cb5449e8a9fe170f29b82e69115c11c222fc38d0602e45875a5bfbf96fe7d1c98b38a0d03523fbc75a3295ce7f1fa8430f8920da831a85f578c5747d75f97926369531e", 0xc8, 0xfffffffffffffffc}, {&(0x7f0000000dc0)="6abcee5683a4cfaaa21674797c7bb35eebb198d761", 0x15, 0x6}], 0x100000, &(0x7f0000000f00)={[{@nodots='nodots'}, {@dots='dots'}, {@fat=@uid={'uid', 0x3d, r5}}, {@fat=@umask={'umask', 0x3d, 0x100000000}}]}) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) [ 760.981521] usb usb9: usbfs: process 19599 (syz-executor1) did not claim interface 0 before use [ 760.990773] hfs: unable to load codepage "iso885=-4" [ 760.996013] hfs: unable to parse mount options 21:32:07 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso885\n-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 761.038956] usb usb9: check_ctrlrecip: process 19603 (syz-executor7) requesting ep 01 but needs 81 [ 761.048407] usb usb9: usbfs: process 19603 (syz-executor7) did not claim interface 0 before use 21:32:07 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x48}) 21:32:07 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0xffffff7f00000000}) 21:32:07 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso885\n-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:07 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x6}) 21:32:07 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x4020940d, &(0x7f0000000240)={0x0, 0x1000000}) [ 761.239870] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 761.239870] [ 761.269898] hfs: unable to load codepage "iso885 [ 761.269898] -4" [ 761.276541] hfs: unable to parse mount options [ 761.313723] usb usb9: usbfs: process 19635 (syz-executor4) did not claim interface 0 before use [ 761.325753] usb usb9: usbfs: process 19636 (syz-executor1) did not claim interface 0 before use [ 761.394440] hfs: unable to load codepage "iso885 [ 761.394440] -4" [ 761.401180] hfs: unable to parse mount options [ 761.406410] hfs: unable to load codepage "iso885 [ 761.406410] -4" [ 761.413083] hfs: unable to parse mount options [ 761.413657] usb usb9: check_ctrlrecip: process 19650 (syz-executor7) requesting ep 01 but needs 81 [ 761.427139] usb usb9: usbfs: process 19650 (syz-executor7) did not claim interface 0 before use 21:32:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x1, 0x0, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5c, &(0x7f0000000000), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:32:07 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000f80)='keyring\x00', &(0x7f0000000fc0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) keyctl$get_keyring_id(0x0, r2, 0x5) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r4) statfs(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)=""/127) keyctl$invalidate(0x15, r2) getrusage(0x1, &(0x7f0000000700)) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r3, &(0x7f0000000e80)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) 21:32:07 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x6800000000000000}) 21:32:07 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x68}) [ 761.491536] hfs: unable to load codepage "iso885 [ 761.491536] -4" [ 761.498479] hfs: unable to parse mount options 21:32:07 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x8108551b, &(0x7f0000000240)={0x0, 0x1000000}) 21:32:07 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso885<-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:07 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859<4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:07 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x7a00000000000000}) [ 761.613911] usb usb9: usbfs: process 19667 (syz-executor4) did not claim interface 0 before use [ 761.626657] usb usb9: usbfs: process 19669 (syz-executor1) did not claim interface 0 before use [ 761.696206] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 761.696206] [ 761.785104] hfs: unable to load codepage "iso885<-4" [ 761.790518] hfs: unable to parse mount options [ 761.841251] usb usb9: check_ctrlrecip: process 19696 (syz-executor7) requesting ep 01 but needs 81 [ 761.850587] usb usb9: usbfs: process 19696 (syz-executor7) did not claim interface 0 before use 21:32:08 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x6000000000000000}) 21:32:08 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000f80)='keyring\x00', &(0x7f0000000fc0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) keyctl$get_keyring_id(0x0, r2, 0x5) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r4) statfs(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)=""/127) keyctl$invalidate(0x15, r2) getrusage(0x1, &(0x7f0000000700)) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) 21:32:08 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x700000000000000}) [ 761.881558] hfs: unable to load codepage "iso8859<4" [ 761.886903] hfs: unable to parse mount options [ 761.911621] hfs: unable to load codepage "iso885<-4" [ 761.916940] hfs: unable to parse mount options 21:32:08 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x5451, &(0x7f0000000240)={0x0, 0x1000000}) [ 761.953720] hfs: unable to load codepage "iso8859<4" [ 761.959011] hfs: unable to parse mount options 21:32:08 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x200) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x1, 0x0, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5c, &(0x7f0000000000), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:32:08 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso885=-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 762.052686] usb usb9: usbfs: process 19714 (syz-executor1) did not claim interface 0 before use 21:32:08 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859=4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:08 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x4800000000000000}) [ 762.098115] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 762.098115] [ 762.129450] usb usb9: usbfs: process 19715 (syz-executor4) did not claim interface 0 before use 21:32:08 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x6800}) 21:32:08 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x600}) 21:32:08 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x2, &(0x7f0000000240)={0x0, 0x1000000}) [ 762.267502] usb usb9: check_ctrlrecip: process 19738 (syz-executor7) requesting ep 01 but needs 81 [ 762.276798] usb usb9: usbfs: process 19738 (syz-executor7) did not claim interface 0 before use 21:32:08 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000f80)='keyring\x00', &(0x7f0000000fc0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) keyctl$get_keyring_id(0x0, r2, 0x5) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r4) statfs(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)=""/127) keyctl$invalidate(0x15, r2) getrusage(0x1, &(0x7f0000000700)) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) [ 762.333002] hfs: unable to load codepage "iso8859=4" [ 762.338522] hfs: unable to parse mount options [ 762.343265] hfs: unable to load codepage "iso885=-4" [ 762.348474] hfs: unable to parse mount options 21:32:08 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x400000000000000}) [ 762.450420] hfs: unable to load codepage "iso885=-4" [ 762.455665] hfs: unable to parse mount options [ 762.467961] hfs: unable to load codepage "iso8859=4" [ 762.473160] hfs: unable to parse mount options 21:32:08 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x5}) 21:32:08 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f00000001c0)={0x6a851dbc, 0x7, 0x3000}, 0x4) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x1, 0x0, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5c, &(0x7f0000000000), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:32:08 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso885\t-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:08 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x5460, &(0x7f0000000240)={0x0, 0x1000000}) [ 762.565239] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 762.565239] 21:32:08 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0xa000000}) [ 762.630262] usb usb9: usbfs: process 19775 (syz-executor1) did not claim interface 0 before use 21:32:08 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-<'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:08 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x48}) [ 762.756703] usb usb9: check_ctrlrecip: process 19789 (syz-executor7) requesting ep 01 but needs 81 [ 762.765940] usb usb9: usbfs: process 19789 (syz-executor7) did not claim interface 0 before use 21:32:08 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000f80)='keyring\x00', &(0x7f0000000fc0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) keyctl$get_keyring_id(0x0, r2, 0x5) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r4) statfs(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)=""/127) keyctl$invalidate(0x15, r2) getrusage(0x1, &(0x7f0000000700)) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) 21:32:09 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x7400000000000000}) 21:32:09 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc020660b, &(0x7f0000000240)={0x0, 0x1000000}) [ 762.849459] hfs: unable to load codepage "iso885 -4" [ 762.854706] hfs: unable to parse mount options [ 762.904949] hfs: unable to load codepage "iso8859-<" [ 762.910278] hfs: unable to parse mount options [ 762.972922] usb usb9: usbfs: process 19812 (syz-executor4) did not claim interface 0 before use [ 762.996706] hfs: unable to load codepage "iso885 -4" [ 763.001932] hfs: unable to parse mount options [ 763.017828] usb usb9: usbfs: process 19821 (syz-executor1) did not claim interface 0 before use 21:32:09 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x400000000000000}) [ 763.044286] hfs: unable to load codepage "iso8859-<" [ 763.049562] hfs: unable to parse mount options [ 763.070310] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 763.070310] 21:32:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0xffffffffffffffff, r1) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x1, 0x0, &(0x7f0000000000), 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5c, &(0x7f0000000000), 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000180)=0x5, 0x4) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x9, 0x20, 0xffffffff, 0x6}, &(0x7f0000000200)=0x18) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000240)={r4, 0x100000001, 0x4, [0x8001, 0x7fff, 0xe57a, 0x0]}, &(0x7f0000000280)=0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:32:09 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x500}) 21:32:09 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x8010550e, &(0x7f0000000240)={0x0, 0x1000000}) 21:32:09 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso885c-4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 763.156136] usb usb9: check_ctrlrecip: process 19832 (syz-executor7) requesting ep 01 but needs 81 [ 763.165630] usb usb9: usbfs: process 19832 (syz-executor7) did not claim interface 0 before use 21:32:09 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x200000000000000}) 21:32:09 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-%'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:09 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000f80)='keyring\x00', &(0x7f0000000fc0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) keyctl$get_keyring_id(0x0, r2, 0x5) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r4) statfs(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)=""/127) keyctl$invalidate(0x15, r2) getrusage(0x1, &(0x7f0000000700)) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) [ 763.313585] usb usb9: usbfs: process 19846 (syz-executor4) did not claim interface 0 before use [ 763.359372] usb usb9: usbfs: process 19856 (syz-executor1) did not claim interface 0 before use 21:32:09 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x6000}) 21:32:09 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc01855a1, &(0x7f0000000240)={0x0, 0x1000000}) [ 763.413134] hfs: unable to load codepage "iso885c-4" [ 763.418461] hfs: unable to parse mount options [ 763.427625] hfs: unable to load codepage "iso8859-%" [ 763.432926] hfs: unable to parse mount options 21:32:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000180)={0x0, 0x4}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000200)={r2, @in={{0x2, 0x4e23, @multicast1}}, [0x2, 0x9, 0x0, 0x0, 0x0, 0x5, 0x3f, 0x8, 0x3c, 0x80, 0x8, 0x81, 0xe80f, 0x6, 0x8]}, &(0x7f0000000300)=0x100) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x1, 0x0, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5c, &(0x7f0000000000), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000340)={r4}) [ 763.537466] hfs: unable to load codepage "iso885c-4" [ 763.542918] hfs: unable to parse mount options [ 763.554531] usb usb9: check_ctrlrecip: process 19877 (syz-executor7) requesting ep 01 but needs 81 [ 763.563888] usb usb9: usbfs: process 19877 (syz-executor7) did not claim interface 0 before use 21:32:09 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x4000000}) [ 763.587591] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 763.587591] 21:32:09 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x74}) 21:32:09 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859=4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:09 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-0'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 763.698303] usb usb9: usbfs: process 19893 (syz-executor1) did not claim interface 0 before use 21:32:09 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x8008551d, &(0x7f0000000240)={0x0, 0x1000000}) 21:32:09 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x700000000000000}) 21:32:09 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000f80)='keyring\x00', &(0x7f0000000fc0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) keyctl$get_keyring_id(0x0, r2, 0x5) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) statfs(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)=""/127) keyctl$invalidate(0x15, r2) getrusage(0x1, &(0x7f0000000700)) recvfrom$inet6(r1, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) [ 763.772195] usb usb9: usbfs: process 19896 (syz-executor4) did not claim interface 0 before use [ 763.797533] Unknown ioctl 35297 [ 763.811201] hfs: unable to load codepage "iso8859=4" [ 763.816484] hfs: unable to parse mount options [ 763.858866] Unknown ioctl 35297 21:32:10 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x7a00}) [ 763.904625] hfs: unable to load codepage "iso8859-0" [ 763.909889] hfs: unable to parse mount options [ 763.935131] usb usb9: check_ctrlrecip: process 19920 (syz-executor7) requesting ep 01 but needs 81 [ 763.944549] usb usb9: usbfs: process 19920 (syz-executor7) did not claim interface 0 before use 21:32:10 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x7a}) [ 763.995656] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 763.995656] [ 764.005707] hfs: unable to load codepage "iso8859=4" [ 764.013184] hfs: unable to parse mount options 21:32:10 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0045878, &(0x7f0000000240)={0x0, 0x1000000}) [ 764.042505] hfs: unable to load codepage "iso8859-0" [ 764.047787] hfs: unable to parse mount options 21:32:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x406, r1) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5c, &(0x7f0000000000), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:32:10 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x2000}) 21:32:10 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859<4'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:10 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x6c00000000000000}) 21:32:10 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-7'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 764.182411] usb usb9: usbfs: process 19944 (syz-executor4) did not claim interface 0 before use 21:32:10 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000f80)='keyring\x00', &(0x7f0000000fc0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) keyctl$get_keyring_id(0x0, r2, 0x5) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) statfs(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)=""/127) keyctl$invalidate(0x15, r2) getrusage(0x1, &(0x7f0000000700)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) [ 764.320944] usb usb9: usbfs: process 19958 (syz-executor1) did not claim interface 0 before use [ 764.332521] usb usb9: check_ctrlrecip: process 19960 (syz-executor7) requesting ep 01 but needs 81 [ 764.341795] usb usb9: usbfs: process 19960 (syz-executor7) did not claim interface 0 before use 21:32:10 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x8008550e, &(0x7f0000000240)={0x0, 0x1000000}) [ 764.377809] hfs: invalid session number or type of track [ 764.378527] usb usb9: usbfs: process 19944 (syz-executor4) did not claim interface 0 before use [ 764.383393] hfs: can't find a HFS filesystem on dev loop2 [ 764.427260] hfs: unable to load codepage "iso8859<4" [ 764.432545] hfs: unable to parse mount options 21:32:10 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x600000000000000}) 21:32:10 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x7000000}) 21:32:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x1, 0x0, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f000002e000/0x18000)=nil, &(0x7f0000000000)=[@text32={0x20, &(0x7f0000000180)="b9800000c00f3235000800000f300f06660f63bff10000000f20c035000000400f22c02a3d00380000660ffb97f79a0000b954090000b800580000ba000000000f30b95e080000b8a1ae0000ba000000000f30360f217766b800018ec8", 0x5d}], 0x1, 0x20, &(0x7f0000000200), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5c, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(r2, r2, &(0x7f000004b000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f0000000200)="c4e1a310f10f0f5d00a7b9eb0a00000f329a001800008e0066b8dc008ee8c4c205161a660f38043836650f01cfc4e1f9111a9a000000009b00", 0x39}], 0x1, 0x0, &(0x7f0000000280), 0x0) ioctl$KVM_SET_XCRS(r3, 0x4188aea7, &(0x7f0000000280)={0x1, 0x100000000, [{0x6, 0x0, 0x1e}]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 764.495610] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 764.495610] [ 764.522603] hfs: unable to load codepage "iso8859<4" [ 764.527818] hfs: unable to parse mount options 21:32:10 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x300000000000000}) 21:32:10 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, &(0x7f0000000240)={0x0, 0x1000000}) 21:32:10 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-%'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 764.625630] hfs: invalid session number or type of track [ 764.631196] hfs: can't find a HFS filesystem on dev loop2 [ 764.653870] usb usb9: usbfs: process 19995 (syz-executor1) did not claim interface 0 before use 21:32:10 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000f80)='keyring\x00', &(0x7f0000000fc0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) keyctl$get_keyring_id(0x0, r2, 0x5) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) statfs(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)=""/127) keyctl$invalidate(0x15, r2) getrusage(0x1, &(0x7f0000000700)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) [ 764.704243] usb usb9: check_ctrlrecip: process 19998 (syz-executor7) requesting ep 01 but needs 81 [ 764.713481] usb usb9: usbfs: process 19998 (syz-executor7) did not claim interface 0 before use [ 764.722902] usb usb9: usbfs: process 19999 (syz-executor4) did not claim interface 0 before use 21:32:10 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-c'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:10 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x3f000000}) 21:32:10 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x6c000000}) 21:32:11 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x3f00000000000000}) [ 764.900682] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 764.900682] [ 764.921229] hfs: unable to load codepage "iso8859-%" [ 764.926514] hfs: unable to parse mount options 21:32:11 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, &(0x7f0000000240)={0x0, 0x1000000}) [ 765.014840] usb usb9: usbfs: process 20037 (syz-executor1) did not claim interface 0 before use [ 765.043841] hfs: unable to load codepage "iso8859-c" [ 765.049122] hfs: unable to parse mount options 21:32:11 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000f80)='keyring\x00', &(0x7f0000000fc0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) keyctl$get_keyring_id(0x0, r2, 0x5) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) statfs(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)=""/127) keyctl$invalidate(0x15, r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) [ 765.062260] hfs: unable to load codepage "iso8859-%" [ 765.067491] hfs: unable to parse mount options [ 765.084237] usb usb9: check_ctrlrecip: process 20038 (syz-executor7) requesting ep 01 but needs 81 [ 765.093543] usb usb9: usbfs: process 20038 (syz-executor7) did not claim interface 0 before use 21:32:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = shmget$private(0x0, 0x1000, 0x1204, &(0x7f000003a000/0x1000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000000180)=""/200) r3 = fcntl$dupfd(r1, 0x0, r0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x1, 0x0, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5c, &(0x7f0000000000), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000000)={0x6, r3}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000280)) 21:32:11 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x2000000000000000}) 21:32:11 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-7'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 765.131537] usb usb9: usbfs: process 20037 (syz-executor1) did not claim interface 0 before use [ 765.160682] hfs: unable to load codepage "iso8859-c" [ 765.165906] hfs: unable to parse mount options 21:32:11 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0xa000000}) 21:32:11 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000240)={0x0, 0x1000000}) [ 765.251295] usb usb9: usbfs: process 20060 (syz-executor4) did not claim interface 0 before use 21:32:11 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x3}) [ 765.321972] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 765.321972] [ 765.331776] hfs: invalid session number or type of track [ 765.340077] hfs: can't find a HFS filesystem on dev loop3 21:32:11 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-d'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:11 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000f80)='keyring\x00', &(0x7f0000000fc0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) keyctl$get_keyring_id(0x0, r2, 0x5) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) statfs(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)=""/127) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) 21:32:11 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x6000000000000000}) [ 765.508726] hfs: invalid session number or type of track [ 765.514341] hfs: can't find a HFS filesystem on dev loop3 21:32:11 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x20000000}) 21:32:11 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc00c5512, &(0x7f0000000240)={0x0, 0x1000000}) 21:32:11 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x3f00}) [ 765.596977] hfs: unable to load codepage "iso8859-d" [ 765.602243] hfs: unable to parse mount options 21:32:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x1, 0x0, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5c, &(0x7f0000000000), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) set_tid_address(&(0x7f0000000000)) 21:32:11 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0xa000000}) 21:32:11 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-<'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 765.684337] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 765.684337] [ 765.748245] hfs: unable to load codepage "iso8859-d" [ 765.753578] hfs: unable to parse mount options 21:32:11 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x4008550c, &(0x7f0000000240)={0x0, 0x1000000}) 21:32:11 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x3000000}) 21:32:12 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r2 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000f80)='keyring\x00', &(0x7f0000000fc0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) keyctl$get_keyring_id(0x0, r2, 0x5) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) 21:32:12 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-='}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:12 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x500}) 21:32:12 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x7400}) [ 765.936265] hfs: unable to load codepage "iso8859-<" [ 765.941581] hfs: unable to parse mount options [ 766.066494] hfs: unable to load codepage "iso8859-<" [ 766.071851] hfs: unable to parse mount options [ 766.089936] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 766.089936] 21:32:12 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x700000000000000}) 21:32:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x1, 0x0, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5c, &(0x7f0000000000), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:32:12 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x4}) [ 766.126854] hfs: unable to load codepage "iso8859-=" [ 766.132190] hfs: unable to parse mount options 21:32:12 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x6000}) 21:32:12 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-='}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 766.257283] hfs: unable to load codepage "iso8859-=" [ 766.262528] hfs: unable to parse mount options 21:32:12 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r1 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000f80)='keyring\x00', &(0x7f0000000fc0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r1) keyctl$get_keyring_id(0x0, r1, 0x5) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) 21:32:12 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-\n'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:12 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x4c}) 21:32:12 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x2000000}) 21:32:12 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0xa}) [ 766.459848] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 766.459848] [ 766.481487] hfs: unable to load codepage "iso8859-=" [ 766.486762] hfs: unable to parse mount options [ 766.571579] hfs: unable to load codepage "iso8859-=" [ 766.576841] hfs: unable to parse mount options [ 766.600119] hfs: unable to load codepage "iso8859- [ 766.600119] " [ 766.606717] hfs: unable to parse mount options [ 766.716465] hfs: unable to load codepage "iso8859- [ 766.716465] " [ 766.723083] hfs: unable to parse mount options 21:32:12 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x4008550d, &(0x7f0000000240)={0x0, 0x1000000}) 21:32:12 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x7}) 21:32:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x1, 0x0, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5c, &(0x7f0000000000), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) 21:32:12 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x3000000}) 21:32:12 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r1 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000f80)='keyring\x00', &(0x7f0000000fc0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r1) keyctl$get_keyring_id(0x0, r1, 0x5) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) 21:32:12 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-\n'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:12 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x500000000000000}) 21:32:13 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}, 0x3c}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:13 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x74}) 21:32:13 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0xffffff7f}) [ 766.903262] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 766.903262] [ 766.940576] hfs: unable to load codepage "iso8859- [ 766.940576] " [ 766.947266] hfs: unable to parse mount options 21:32:13 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x48000000}) 21:32:13 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, &(0x7f0000000240)={0x0, 0x1000000}) [ 767.069303] hfs: unable to load codepage "iso8859- [ 767.069303] " [ 767.075971] hfs: unable to parse mount options [ 767.102479] hfs: unable to load codepage "iso8859-40xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) 21:32:13 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x60000000}) 21:32:13 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}, 0x3d}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:13 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x80045519, &(0x7f0000000240)={0x0, 0x1000000}) [ 767.384248] hfs: unable to load codepage "iso8859-0" [ 767.389520] hfs: unable to parse mount options 21:32:13 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x3f000000}) 21:32:13 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) [ 767.463248] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 767.463248] 21:32:13 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x8004551a, &(0x7f0000000240)={0x0, 0x1000000}) 21:32:13 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x6c}) [ 767.517768] hfs: unable to load codepage "iso8859-4=iocharset=cp866" [ 767.524429] hfs: unable to parse mount options [ 767.529459] hfs: unable to load codepage "iso8859-0" [ 767.534669] hfs: unable to parse mount options [ 767.641360] hfs: unable to load codepage "iso8859-4=iocharset=cp866" [ 767.647971] hfs: unable to parse mount options 21:32:13 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-c'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:13 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) 21:32:13 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x600}) 21:32:13 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r1 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000f80)='keyring\x00', &(0x7f0000000fc0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) [ 767.882620] hfs: unable to load codepage "iso8859-c" [ 767.887862] hfs: unable to parse mount options [ 767.908877] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 767.908877] [ 768.000961] hfs: unable to load codepage "iso8859-c" [ 768.006248] hfs: unable to parse mount options 21:32:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x2000, 0x0) write$FUSE_BMAP(r2, &(0x7f0000000180)={0x18, 0xfffffffffffffff5, 0x2, {0x400}}, 0x18) r3 = fcntl$dupfd(r1, 0x0, r1) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x1, 0x0, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5c, &(0x7f0000000000), 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000000)=0x0) r6 = getpgrp(0xffffffffffffffff) kcmp(r5, r6, 0x4, r4, r4) ioctl$KVM_RUN(r4, 0xae80, 0x0) 21:32:14 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x8008551c, &(0x7f0000000240)={0x0, 0x1000000}) 21:32:14 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-d'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:14 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x700}) 21:32:14 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x200000000000000}) 21:32:14 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'%ocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:14 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) 21:32:14 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) [ 768.108879] hfs: unable to parse mount options [ 768.144736] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 768.144736] 21:32:14 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x7400000000000000}) 21:32:14 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x6c00}) 21:32:14 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x5514, &(0x7f0000000240)={0x0, 0x1000000}) [ 768.200833] hfs: unable to parse mount options 21:32:14 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) 21:32:14 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'\nocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 768.309782] hfs: unable to load codepage "iso8859-d" [ 768.315068] hfs: unable to parse mount options 21:32:14 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) 21:32:14 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x300000000000000}) 21:32:14 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x7000000}) [ 768.437428] hfs: unable to load codepage "iso8859-d" [ 768.441617] hfs: unable to parse mount options [ 768.442658] hfs: unable to parse mount options [ 768.535612] hfs: unable to parse mount options 21:32:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x1, 0x0, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5f, &(0x7f0000000000), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:32:14 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550c, &(0x7f0000000240)={0x0, 0x1000000}) [ 768.557568] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 768.557568] 21:32:14 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}, 0x3c}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:14 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) 21:32:14 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'i\ncharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:14 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x68000000}) 21:32:14 executing program 0: socket$inet6(0xa, 0x3, 0x3a) openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x10283, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) [ 768.707757] hfs: unable to parse mount options 21:32:14 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x7000000}) 21:32:14 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) [ 768.762943] hfs: unable to parse mount options 21:32:15 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'i%charset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:15 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x3}) [ 768.895255] hfs: unable to load codepage "iso8859-40xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) [ 769.119743] hfs: unable to parse mount options 21:32:15 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x1000000}) 21:32:15 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) [ 769.291581] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 769.291581] 21:32:15 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x4004551e, &(0x7f0000000240)={0x0, 0x1000000}) 21:32:15 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}, 0x3d}, {@iocharset={'iocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:15 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x6000}) 21:32:15 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'io\nharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000000), &(0x7f0000000200)=0x8) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) fstat(r2, &(0x7f0000000180)) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x1, 0x0, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5c, &(0x7f0000000000), 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000240)={0x2000, 0x100000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:32:15 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x6c000000}) 21:32:15 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) 21:32:15 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) [ 769.518068] hfs: unable to parse mount options 21:32:15 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) 21:32:15 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x7a00}) [ 769.550157] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 769.550157] [ 769.583228] hfs: unable to load codepage "iso8859-4=iocharset=cp866" [ 769.589913] hfs: unable to parse mount options 21:32:15 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x4000000000000000}) [ 769.614981] hfs: unable to parse mount options 21:32:15 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'io%harset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:15 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) 21:32:15 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0x40049409, &(0x7f0000000240)={0x0, 0x1000000}) [ 769.729749] hfs: unable to load codepage "iso8859-4=iocharset=cp866" [ 769.736383] hfs: unable to parse mount options 21:32:15 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x600}) 21:32:15 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) 21:32:16 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0xa000000}) [ 769.888585] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 769.888585] 21:32:16 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'%ocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 769.931516] hfs: unable to parse mount options 21:32:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x1, 0x0, &(0x7f0000000000), 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x6}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000001c0)={r4, @in={{0x2, 0x4e22, @remote}}}, &(0x7f0000000280)=0x84) getsockopt(r2, 0x1, 0xffffffffffff8001, &(0x7f00000002c0)=""/203, &(0x7f00000003c0)=0xcb) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5c, &(0x7f0000000000), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:32:16 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0189436, &(0x7f0000000240)={0x0, 0x1000000}) 21:32:16 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x700}) 21:32:16 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) 21:32:16 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x48000000}) 21:32:16 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'ioc\narset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:16 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) [ 770.074420] hfs: unable to parse mount options [ 770.159345] hfs: unable to parse mount options 21:32:16 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x100000000000000}) [ 770.246892] hfs: unable to parse mount options [ 770.249952] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 770.249952] 21:32:16 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'\nocharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:16 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x930000000000, 0x1000000}) 21:32:16 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x600000000000000}) 21:32:16 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) 21:32:16 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'ioc%arset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 770.464500] hfs: unable to parse mount options 21:32:16 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x7a00000000000000}) 21:32:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x1, 0x0, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5c, &(0x7f0000000000), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 770.548640] hfs: unable to parse mount options 21:32:16 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) 21:32:16 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) [ 770.601987] hfs: unable to parse mount options 21:32:16 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x40000000, 0x1000000}) 21:32:16 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x4c00000000000000}) [ 770.708406] hfs: unable to parse mount options 21:32:16 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'i\ncharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:16 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0xffffff7f}) [ 770.778290] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 770.778290] 21:32:17 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'ioch%rset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:17 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) 21:32:17 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x6c}) [ 770.929303] hfs: unable to parse mount options 21:32:17 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0xa100, 0x1000000}) 21:32:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) [ 771.009482] hfs: unable to parse mount options [ 771.030716] hfs: unable to parse mount options 21:32:17 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x4000000}) 21:32:17 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xffffffff, 0x280000) ioctl$KIOCSOUND(r1, 0x4b2f, 0x3) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x1, 0x0, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) readahead(r2, 0x2, 0x1000) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5c, &(0x7f0000000000), 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f0000000180)={0x80000000003, 0x80000001}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_GET_ONE_REG(r3, 0x4010aeab, &(0x7f00000001c0)) 21:32:17 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) 21:32:17 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'i%charset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 771.156529] hfs: unable to parse mount options [ 771.175208] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 771.175208] 21:32:17 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x6}) 21:32:17 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x730000000000, 0x1000000}) 21:32:17 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'ioch\nrset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:17 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x7a000000}) [ 771.349763] hfs: unable to parse mount options [ 771.437804] hfs: unable to parse mount options [ 771.452992] hfs: unable to parse mount options 21:32:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) 21:32:17 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x48}) 21:32:17 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) 21:32:17 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x50500000000000, 0x1000000}) [ 771.539761] hfs: unable to parse mount options 21:32:17 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'io\nharset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:17 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x60000000}) 21:32:17 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'iocha%set', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:17 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x35d, 0x1, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5c, &(0x7f0000000000), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 771.709469] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 771.709469] [ 771.804348] hfs: unable to parse mount options 21:32:18 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x4000000}) 21:32:18 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) [ 771.845459] hfs: unable to parse mount options 21:32:18 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x4c00}) 21:32:18 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x2000000, 0x1000000}) [ 771.873466] hfs: unable to parse mount options 21:32:18 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) [ 771.982842] hfs: unable to parse mount options 21:32:18 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'io%harset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:18 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'iocha\nset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:18 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x20000000}) 21:32:18 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) 21:32:18 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x6c00000000000000}) 21:32:18 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x505000, 0x1000000}) [ 772.185875] hfs: unable to parse mount options [ 772.214614] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 772.214614] [ 772.292479] hfs: unable to parse mount options [ 772.293997] hfs: unable to parse mount options 21:32:18 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'ioc\narset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:18 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r2, 0x2287, &(0x7f0000000000)=0x6) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000180)={0x7, 0x2, 0x7fff, 0x0, 0xc}) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0xc008551a, &(0x7f0000000200)={0x400, 0x10, [0xfd5, 0x7, 0x10000000000000, 0x100000000]}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x1, 0x0, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5c, &(0x7f0000000000), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:32:18 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) 21:32:18 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x2}) [ 772.432640] hfs: unable to parse mount options 21:32:18 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x7400}) 21:32:18 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) 21:32:18 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x100000000000000, 0x1000000}) 21:32:18 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'iocharuet', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 772.619204] hfs: unable to parse mount options [ 772.645684] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 772.645684] [ 772.700602] hfs: unable to parse mount options 21:32:18 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x68}) 21:32:18 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x4000000000000000, 0x1000000}) [ 772.739820] hfs: unable to parse mount options 21:32:18 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) 21:32:19 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'ioc%arset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 772.832510] hfs: unable to parse mount options 21:32:19 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x7a}) 21:32:19 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$IP_VS_SO_SET_TIMEOUT(r4, 0x0, 0x60, &(0x7f0000000000), 0xc) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000180)=0x4, 0x4) r5 = fcntl$dupfd(r1, 0x0, r1) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r5, 0xc08c5334, &(0x7f0000000280)={0x10001, 0x9, 0x1, 'queue0\x00', 0xc8ac}) syz_kvm_setup_cpu$x86(r5, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x1, 0x0, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5c, &(0x7f0000000000), 0x0) r7 = msgget(0x2, 0x1) msgrcv(r7, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000000000f9e3d02b899889afb58d89bc883022c9dc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ad8a1ddcfa40e50814bc73ab07711bc590497f16a8107c07dbd89357a8164964d7e6c131ea3c549c54b8cd7aa22229f50a0000000000005cf0170027a23bfca47591f635b931a121a0317bc2f1a1748b284c4f30080058ec06766c364a6981d2f568bf6a9e4fcdb2e8f57cbcec62124b9c7da4d164b41eac00bfa2a0a6a476c3bdb38f368118be4f5638e1f92b5591"], 0x66, 0x3, 0x1000) write$FUSE_GETXATTR(r5, &(0x7f0000000240)={0x18, 0xfffffffffffffffe, 0x5, {0x9}}, 0x18) ioctl$KVM_RUN(r6, 0xae80, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)) 21:32:19 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) 21:32:19 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'iochar0et', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:19 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x2000000}) [ 773.010360] hfs: unable to parse mount options 21:32:19 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) 21:32:19 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x9300, 0x1000000}) 21:32:19 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x68}) [ 773.119280] hfs: unable to parse mount options [ 773.133742] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 773.133742] [ 773.172190] hfs: unable to parse mount options 21:32:19 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x3f000000}) 21:32:19 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'ioch\nrset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 773.298815] hfs: unable to parse mount options 21:32:19 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) 21:32:19 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}, {&(0x7f00000009c0)="0f68698ddb1453e4e08028ddb507c5683f2c7aed318c6f2a681b3dd8620dee9972a5eeaa1f9d98a1a256becf8ed72352d41ff6a46a07bac518f18b967405ed3a88d3c4129529d831bcd821c985b82cba3bda8908e9736c2c18c0f3aa7d2ed2f1bf43b48801d744c734a749da33a2d6cd879f8337dbd7a5aaa1153d15c386bf17276f8079466a7d9818a8021f7bb94fe3b9c736b02ae34d2e33a01cce1eda7eb79a82d580d97716074fff09bd728e6fcb6a9b45f3f8953d2f08d84aa619eb14a5831ca2e9d2e7847ef3757427fbed98ae219173b34bc3ec2ffdfc24bd9abafd2407ff698158febb62", 0xe8, 0x4}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) 21:32:19 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x4800000000000000}) 21:32:19 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x407000, 0x1000000}) [ 773.453661] hfs: unable to parse mount options 21:32:19 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x5000000}) 21:32:19 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'iochar%et', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 773.509365] hfs: unable to parse mount options 21:32:19 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) [ 773.597382] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 773.597382] [ 773.661156] hfs: unable to parse mount options [ 773.745880] hfs: unable to parse mount options 21:32:20 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x6800000000000000}) 21:32:20 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'ioch%rset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:20 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x200000000000000, 0x1000000}) 21:32:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}, {&(0x7f00000008c0)="ae896881d9afd9788df9fc5d7837c5d2fe76a70b9538b16fbee1a13a8565d66374db690cf25c30a33ca7464a1cf1a448d02373f84b1fe9faaa90f11368d52a94bcf12bfbc91e5114d760269fafa87e77d46abe5315da8bebdd81f81205983fc65e62509a3ab1c62779f12c6f31ad30dce407220c16eb95ad066b84e96d582661250abb8d9d818b5ab943394da018f1894c232a9b97ed8ac77010885fa9219cd1e1b2887ce5b5999f32f1526807ff0aff8cc8b3023d4d76eca8637c847197d7d74e95043b8d6978abfcec5a292c7d8890927514296fed8f3113a4530a8860db2c0761027f603a48", 0xe7, 0x80}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) 21:32:20 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x700000000000000}) 21:32:20 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) 21:32:20 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x1, 0x0, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5c, &(0x7f0000000000), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f0000000180)={0x1, 0xfff, 0x9, 0x9, 0x0, 0x100000001}) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000000)=""/24) 21:32:20 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'iochar+et', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 773.956672] hfs: unable to parse mount options [ 773.985704] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 773.985704] [ 773.987230] hfs: unable to parse mount options 21:32:20 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0xa00}) [ 774.043591] hfs: unable to parse mount options 21:32:20 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) 21:32:20 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x4c}) 21:32:20 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x730000, 0x1000000}) [ 774.104459] hfs: unable to parse mount options 21:32:20 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'ioch\trset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}, {&(0x7f0000000640)="e9997c532aee6add8961798f60ea51b178edd794989c79b70c0432bb51336580b079fc39c92d496230e8320e9cf31f2fcca3f637e4c10b75501d494461d62f267b603e6c7352d55db31ed7c5d900e5ae1789b9640fa8c9145a50684493fce3c5adef18061093d4b59fa4465637d400", 0x6f, 0x7}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) 21:32:20 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'iochar-et', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:20 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) 21:32:20 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x6c00}) 21:32:20 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x1, 0x0, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5c, &(0x7f0000000000), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:32:20 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x4000, 0x1000000}) 21:32:20 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x7a00000000000000}) [ 774.383906] hfs: unable to parse mount options [ 774.396486] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 774.396486] [ 774.444336] hfs: unable to parse mount options [ 774.450553] hfs: unable to parse mount options 21:32:20 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x400000000000000}) 21:32:20 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) [ 774.565958] hfs: unable to parse mount options 21:32:20 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'iochcrset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:20 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x7fffffffefff, 0x1000000}) 21:32:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}, {&(0x7f00000005c0)="04aa0049859fb91153c1401649654d2fb1d37d1d7052e9da75088b6266ce06cfde", 0x21, 0x6}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) 21:32:20 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0xffffff7f}) 21:32:20 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'iocharlet', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:20 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x6000000}) [ 774.745720] hfs: unable to parse mount options [ 774.764930] vhci_hcd: default hub control req: ffef vffff i0000 l256 [ 774.768545] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 774.768545] 21:32:20 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) 21:32:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1, 0x80) setsockopt$inet_opts(r1, 0x0, 0xd, &(0x7f0000000180)="8722acfe66f348cd0aefd6b45eaa2b3f46e832672353817706cf04f155bafd4d5738c0fa74e470d22f3e45301b4b29b3074d845a80de1b27b2f0a0c6c87b4eb7d01ad3f26edeb8ab81f217aa3044ad22c2056c1f8c9c9770e2", 0x59) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x80000002) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x1, 0x0, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5c, &(0x7f0000000000), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 774.845177] hfs: unable to parse mount options 21:32:21 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0xa100000000000000, 0x1000000}) 21:32:21 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'iocha\nset', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000ac0)=[{&(0x7f00000004c0)="cf", 0x1, 0x829}], 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) 21:32:21 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x4c00}) [ 775.094555] hfs: unable to parse mount options [ 775.099756] hfs: unable to parse mount options [ 775.101620] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 775.101620] 21:32:21 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x4c000000}) 21:32:21 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) 21:32:21 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0xd07000, 0x1000000}) [ 775.188741] hfs: unable to parse mount options [ 775.195581] hfs: unable to parse mount options 21:32:21 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'iochariet', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000ac0), 0x4, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) 21:32:21 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'iocha%set', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:21 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x500000000000000}) 21:32:21 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x4}) 21:32:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_S390_VCPU_FAULT(0xffffffffffffffff, 0x4008ae52, &(0x7f0000000180)=0x1) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x1, 0x0, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5c, &(0x7f0000000000), 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x4e21, 0x7, @empty, 0xe0}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, @in6={0xa, 0x4e20, 0x2, @mcast2}], 0x48) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 775.433212] hfs: unable to parse mount options 21:32:21 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) 21:32:21 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x7300, 0x1000000}) [ 775.494893] hfs: unable to parse mount options [ 775.517496] hfs: unable to parse mount options [ 775.534745] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 775.534745] [ 775.548478] hfs: unable to parse mount options 21:32:21 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'iocharoet', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:21 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x100000000000000}) 21:32:21 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0xa}) 21:32:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000ac0), 0x0, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}, {@data_journal='data=journal'}]}) 21:32:21 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'iocharoet', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:21 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) 21:32:21 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x704000, 0x1000000}) [ 775.746419] hfs: unable to parse mount options 21:32:22 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x4800000000000000}) [ 775.832724] hfs: unable to parse mount options [ 775.840248] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 775.840248] 21:32:22 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x4c000000}) [ 775.893579] hfs: unable to parse mount options 21:32:22 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'iocharcet', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:22 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) [ 775.956341] hfs: unable to parse mount options 21:32:22 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x930000, 0x1000000}) 21:32:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x1, 0x0, &(0x7f0000000000), 0x1000000000000186) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000000)={0x0, 0xfffffffffffffffe}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f00000001c0)={r4, 0xfba, 0x30, 0x76a8, 0x3}, &(0x7f0000000200)=0x18) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f0000000280)="36d172920f234b64640fc7586b0fc42f000f35f2640fac5cbe2e2ef7a10000660f51cb66b9800000c00f326635004000000f300f20c06635000001000f22c0", 0x3f}], 0x1, 0x5c, &(0x7f0000000240), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:32:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000ac0), 0x0, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}, {@data_ordered='data=ordered'}]}) 21:32:22 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x6}) 21:32:22 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x7}) 21:32:22 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'iocharuet', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 776.133668] hfs: unable to parse mount options 21:32:22 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) [ 776.189868] hfs: unable to parse mount options 21:32:22 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x400000, 0x1000000}) [ 776.256836] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 776.256836] 21:32:22 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0xffffff7f00000000}) 21:32:22 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'iocharpet', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) [ 776.335528] hfs: unable to parse mount options [ 776.381957] hfs: unable to parse mount options 21:32:22 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x6000000000000000}) 21:32:22 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) 21:32:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000ac0), 0x0, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_border='block-allocator=border'}]}) 21:32:22 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'iochardet', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:22 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0xffefffffff7f0000, 0x1000000}) [ 776.545947] hfs: unable to parse mount options 21:32:22 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x600000000000000}) 21:32:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x1, 0x0, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5c, &(0x7f0000000000), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) sendmsg$nl_route_sched(r2, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xf8f6c5ac4c2f2f31}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)=@newqdisc={0xd4, 0x24, 0x2, 0x70bd25, 0x25dfdbfd, {0x0, r4, {0x8}, {0xd, 0x5}, {0x0, 0x10}}, [@TCA_STAB={0x84, 0x8, [@TCA_STAB_BASE={0x1c, 0x1, {0x9, 0x59, 0x3ff, 0x3, 0x1, 0x2, 0x1, 0x3}}, @TCA_STAB_DATA={0x4}, @TCA_STAB_DATA={0x18, 0x2, [0x3, 0x0, 0x3ff, 0x0, 0xff, 0x0, 0x898, 0x80000001, 0x0]}, @TCA_STAB_DATA={0x18, 0x2, [0x9, 0x8, 0x1, 0xffffffffffffffff, 0x8, 0xd01, 0x1, 0x7, 0x23]}, @TCA_STAB_DATA={0xc, 0x2, [0x10f0, 0x81, 0x20, 0x97c4]}, @TCA_STAB_DATA={0x8, 0x2, [0x8294]}, @TCA_STAB_BASE={0x1c, 0x1, {0x80, 0x3, 0x9, 0x2, 0x0, 0x2, 0x3, 0x4}}]}, @TCA_RATE={0x8, 0x5, {0x2, 0x1ff80}}, @TCA_RATE={0x8, 0x5, {0x40, 0x75a8}}, @qdisc_kind_options=@q_hfsc={{0xc, 0x1, 'hfsc\x00'}, {0x8, 0x2, 0x1000}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x7}]}, 0xd4}, 0x1, 0x0, 0x0, 0x8000}, 0x4040) [ 776.635545] hfs: unable to parse mount options [ 776.657747] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 776.657747] [ 776.662768] hfs: unable to parse mount options 21:32:22 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) 21:32:22 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x3f00000000000000}) [ 776.744729] hfs: unable to parse mount options 21:32:22 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x400000000000, 0x1000000}) 21:32:22 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x300}) 21:32:23 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'iochar+et', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000ac0), 0x0, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 21:32:23 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) 21:32:23 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x7a000000}) 21:32:23 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'iochar\net', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:23 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x70d000, 0x1000000}) 21:32:23 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x60}) 21:32:23 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, &(0x7f0000000000)=0x6) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x1, 0x0, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5c, &(0x7f0000000000), 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x6, 0x1) [ 777.068400] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 777.068400] [ 777.082507] hfs: unable to parse mount options [ 777.132440] hfs: unable to parse mount options 21:32:23 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) 21:32:23 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x4800}) [ 777.175551] hfs: unable to parse mount options [ 777.235787] hfs: unable to parse mount options 21:32:23 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'iochar%et', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:23 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0xd0700000000000, 0x1000000}) 21:32:23 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x5}) 21:32:23 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'iocharXet', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000ac0), 0x0, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@resize={'resize', 0x3d, 0x1}}]}) 21:32:23 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) 21:32:23 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x4000}) [ 777.442912] hfs: unable to parse mount options 21:32:23 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x6800000000000000}) 21:32:23 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000180)={0x5, 0x1f2eb649, 0x7f}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000041000/0x1000)=nil, 0x1000, 0x4, 0x10050, r0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000035000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x1, 0x0, &(0x7f0000000000), 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5c, &(0x7f0000000000), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 21:32:23 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x1000000, 0x1000000}) [ 777.510607] hfs: unable to parse mount options [ 777.519753] hfs: unable to parse mount options [ 777.525736] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 777.525736] [ 777.599339] hfs: unable to parse mount options 21:32:23 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'iochar*et', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:23 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) 21:32:23 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x60}) 21:32:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000ac0), 0x0, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}]}) 21:32:23 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'iochar#et', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:23 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x6800}) 21:32:23 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x2, 0x1000000}) [ 777.819330] hfs: unable to parse mount options [ 777.886273] hfs: unable to parse mount options 21:32:24 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) 21:32:24 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x7fffc, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x1, 0x0, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5c, &(0x7f0000000000), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:32:24 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0xa00000000000000}) [ 777.950991] hfs: unable to parse mount options [ 777.958673] hfs: unable to parse mount options [ 777.967582] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 777.967582] 21:32:24 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x40700000000000, 0x1000000}) 21:32:24 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x500000000000000}) 21:32:24 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'iochar*et', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:24 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'iochariet', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:24 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000ac0), 0x0, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}, {@resize_auto='resize=auto'}]}) 21:32:24 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) 21:32:24 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) syz_kvm_setup_cpu$x86(r2, r2, &(0x7f0000048000/0x18000)=nil, &(0x7f0000000000)=[@text32={0x20, &(0x7f0000000180)="af0f01c8b9f80b0000b800000000ba008000000f30b84eaf00000f23c80f21f8350c0080000f23f8360fc71e0f2055c4e3a97873000d36660f21670fdb0d0700000066baf80cb8b03e0f87ef66bafc0c66ed", 0x52}], 0x1, 0x8, &(0x7f0000000200), 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x1, 0x0, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5c, &(0x7f0000000000), 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 778.242080] hfs: unable to parse mount options 21:32:24 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x4c00000000000000}) [ 778.277710] hfs: unable to parse mount options 21:32:24 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x7400000000000000}) 21:32:24 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0xffffffff00000000, 0x1000000}) [ 778.334547] hfs: unable to parse mount options [ 778.363209] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 778.363209] 21:32:24 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'iocharlet', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:24 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) 21:32:24 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'iochardet', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:24 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x20000000}) 21:32:24 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0xa1000000, 0x1000000}) 21:32:24 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0x2000}) [ 778.596729] hfs: unable to parse mount options 21:32:24 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000ac0), 0x0, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}, {@nolargeio='nolargeio'}]}) 21:32:24 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) [ 778.657436] hfs: unable to parse mount options [ 778.662432] hfs: unable to parse mount options 21:32:24 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, &(0x7f0000000480)=[@text16={0x10, &(0x7f0000000140)="660f22d8a40f0726dee70f00971c7565f466660fe4bd62270f019b0090ea00500500b80f008ec8", 0x27}], 0x1, 0x0, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000080)="b805000000b9008000000f01d90fc7aace00000066b85d000f00d06667f01912c4c37bf0d900c7442400f8ffff7fc7442402e7000000c7442406000000000f011424260f0966b8e3008ec0c4c17a528095c145fe440f20c03507000000440f22c0", 0x61}], 0x1, 0x5c, &(0x7f0000000000), 0x0) r4 = getpgid(0x0) sched_getscheduler(r4) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:32:24 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x2000}) [ 778.760572] hfs: unable to parse mount options 21:32:24 executing program 3: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'iocharpet', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:24 executing program 6: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0xa1, 0x1000000}) 21:32:25 executing program 7: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x302, 0x1000001, 0x0, 0xffffff7f00000000}) [ 778.823276] REISERFS warning (device loop0): super-6504 reiserfs_getopt: the option "nolargeio" requires an argument [ 778.823276] 21:32:25 executing program 2: syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, &(0x7f0000001c80), 0x0, &(0x7f0000001d80)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@iocharset={'iochar.et', 0x3d, 'cp866'}}, {@session={'session', 0x3d, 0x10001}}]}) 21:32:25 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x0}) [ 778.929890] hfs: unable to parse mount options [ 778.954581] kasan: CONFIG_KASAN_INLINE enabled [ 778.959559] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 778.967126] general protection fault: 0000 [#1] SMP KASAN [ 778.972676] CPU: 1 PID: 21659 Comm: syz-executor6 Not tainted 4.19.0-rc2+ #220 [ 778.980038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 778.989484] RIP: 0010:usb_find_alt_setting+0x38/0x310 [ 778.994689] Code: 89 fb 48 83 ec 10 48 89 7d c8 89 55 d4 89 75 d0 e8 5d f1 0a fd 48 8d 7b 04 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 48 89 fa 83 e2 07 38 d0 7f 08 84 c0 0f 85 86 02 00 00 [ 779.013602] RSP: 0018:ffff8801c42774a8 EFLAGS: 00010247 [ 779.018976] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc900036a0000 [ 779.026244] RDX: 0000000000000000 RSI: ffffffff8471ddc3 RDI: 0000000000000004 [ 779.033515] RBP: ffff8801c42774e0 R08: ffff8801cfbcc0c0 R09: ffffed003884eeb2 [ 779.040781] R10: ffffed003884eeb4 R11: ffff8801c42775a7 R12: 0000000000000000 [ 779.048048] R13: ffff8801ce784ec0 R14: ffff8801be576280 R15: 0000000000000000 [ 779.055319] FS: 00007f0871554700(0000) GS:ffff8801db100000(0000) knlGS:0000000000000000 [ 779.063553] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 779.069449] CR2: 0000001b31c22000 CR3: 00000001c1578000 CR4: 00000000001426e0 [ 779.076727] Call Trace: [ 779.079338] check_ctrlrecip+0x1e6/0x320 [ 779.083414] ? _copy_from_user+0xdf/0x150 [ 779.087571] proc_control+0x151/0xef0 [ 779.091379] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 779.096927] ? get_futex_value_locked+0xcb/0xf0 [ 779.101605] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 779.106632] ? proc_bulk+0xaa0/0xaa0 [ 779.110368] usbdev_do_ioctl+0x1eb4/0x3b30 [ 779.114615] ? processcompl_compat+0x680/0x680 [ 779.119206] ? futex_wait+0x5d2/0xa20 [ 779.123020] ? mark_held_locks+0x160/0x160 [ 779.127284] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 779.132490] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 779.137600] ? futex_wake+0x304/0x760 [ 779.141422] ? _raw_spin_unlock_irq+0x27/0x70 [ 779.145925] ? graph_lock+0x170/0x170 [ 779.149728] ? do_futex+0x249/0x27d0 [ 779.153442] ? kasan_check_read+0x11/0x20 [ 779.157591] ? finish_task_switch+0x1d3/0x870 [ 779.162086] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 779.167200] ? compat_start_thread+0x80/0x80 [ 779.171617] ? find_held_lock+0x36/0x1c0 [ 779.175685] ? lock_downgrade+0x8f0/0x8f0 [ 779.179833] ? __switch_to_asm+0x40/0x70 [ 779.183896] ? kasan_check_read+0x11/0x20 [ 779.188044] ? rcu_is_watching+0x8c/0x150 [ 779.192201] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 779.196876] ? __fget+0x4d5/0x740 [ 779.200339] ? ksys_dup3+0x690/0x690 [ 779.204065] usbdev_ioctl+0x25/0x30 [ 779.207690] ? usbdev_compat_ioctl+0x30/0x30 [ 779.212116] do_vfs_ioctl+0x1de/0x1720 [ 779.216009] ? ioctl_preallocate+0x300/0x300 [ 779.220420] ? __fget_light+0x2f7/0x440 [ 779.224392] ? __schedule+0x1df0/0x1df0 [ 779.228367] ? fget_raw+0x20/0x20 [ 779.231819] ? trace_hardirqs_off+0xb8/0x2b0 [ 779.236234] ? __x64_sys_futex+0x47f/0x6a0 [ 779.240471] ? do_syscall_64+0x9a/0x820 [ 779.244449] ? do_syscall_64+0x9a/0x820 [ 779.248429] ? lockdep_hardirqs_on+0x421/0x5c0 [ 779.253014] ? security_file_ioctl+0x94/0xc0 [ 779.257430] ksys_ioctl+0xa9/0xd0 [ 779.260887] __x64_sys_ioctl+0x73/0xb0 [ 779.264777] do_syscall_64+0x1b9/0x820 [ 779.268673] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 779.274045] ? syscall_return_slowpath+0x5e0/0x5e0 [ 779.278986] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 779.284014] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 779.289034] ? recalc_sigpending_tsk+0x180/0x180 [ 779.293793] ? kasan_check_write+0x14/0x20 [ 779.298035] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 779.302883] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 779.308066] RIP: 0033:0x457099 [ 779.311261] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 779.330161] RSP: 002b:00007f0871553c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 779.337877] RAX: ffffffffffffffda RBX: 00007f08715546d4 RCX: 0000000000457099 [ 779.345142] RDX: 0000000020000240 RSI: 00000000c0185500 RDI: 0000000000000003 [ 779.352405] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 779.359667] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 779.366940] R13: 00000000004ce8f0 R14: 00000000004c4e0b R15: 0000000000000000 [ 779.374215] Modules linked in: [ 779.377406] Dumping ftrace buffer: [ 779.381030] (ftrace buffer empty) [ 779.384833] ---[ end trace 6b4ea40388ddcc5e ]--- [ 779.389632] RIP: 0010:usb_find_alt_setting+0x38/0x310 [ 779.394251] hfs: unable to parse mount options 21:32:25 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000ac0), 0x0, &(0x7f0000000b40)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}, {@expose_privroot='expose_privroot'}]}) [ 779.394854] Code: 89 fb 48 83 ec 10 48 89 7d c8 89 55 d4 89 75 d0 e8 5d f1 0a fd 48 8d 7b 04 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 48 89 fa 83 e2 07 38 d0 7f 08 84 c0 0f 85 86 02 00 00 [ 779.418396] RSP: 0018:ffff8801c42774a8 EFLAGS: 00010247 [ 779.423793] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc900036a0000 [ 779.431087] RDX: 0000000000000000 RSI: ffffffff8471ddc3 RDI: 0000000000000004 [ 779.438806] RBP: ffff8801c42774e0 R08: ffff8801cfbcc0c0 R09: ffffed003884eeb2 [ 779.446112] R10: ffffed003884eeb4 R11: ffff8801c42775a7 R12: 0000000000000000 21:32:25 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000240)={0x81, 0x0, 0x0, 0x0, 0x4800}) [ 779.453411] R13: ffff8801ce784ec0 R14: ffff8801be576280 R15: 0000000000000000 [ 779.460715] FS: 00007f0871554700(0000) GS:ffff8801db100000(0000) knlGS:0000000000000000 [ 779.468970] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 779.474891] CR2: 0000001b31c22000 CR3: 00000001c1578000 CR4: 00000000001426e0 [ 779.482192] Kernel panic - not syncing: Fatal exception [ 779.487844] Dumping ftrace buffer: [ 779.491373] (ftrace buffer empty) [ 779.495061] Kernel Offset: disabled [ 779.498708] Rebooting in 86400 seconds..