= socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x8}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f00000008c0)={0x0, {}, {}, {0x2, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xc7e, &(0x7f0000000800)='bridge_slave_1\x00'}) getsockopt$inet_int(r4, 0x0, 0x31, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockopt$inet_mreqsrc(r4, 0x0, 0x2f, &(0x7f0000000080)={@multicast1, @loopback, @dev}, &(0x7f00000001c0)=0xc) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @link_local}, 0x466c396f03ed0d99) dup2(r2, r0) [ 1609.341883] kernel msg: ebtables bug: please report to author: entries_size too small [ 1609.357593] hfsplus: unable to find HFS+ superblock 03:51:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@nat={'nat\x00', 0x19, 0x2, 0x17e, [0x20000100, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000006600000000000000000000000000000000000000000000000000000000000000ffffffff020400000d00000000000000080669726c616e300000000000000000000069705f7674693000000000000000000073797a6b616c6c65723100000000000076657468305f746f5f626f6e64000000aaaaaaaa0700000000000000ffffffffffff000000000000000070000000a0000000d80000004155444954000000000000000000000000000000000000000000080000000000080000000000000000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000ffffffff000000001f000000000000000000626f6e645f736c6176655f310000000073797a6b616c6c65723000000000000079616d3000000000000000000000000062707130000000000000000000000000aaaaaaaaaa00000000000000aaaaaaaaaabb00000000000000007000000070000000a8000000617270726570"]}, 0x1f6) 03:51:09 executing program 2: [ 1609.445764] hfsplus: unable to find HFS+ superblock 03:51:10 executing program 2: 03:51:10 executing program 4: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r2, 0x0) r3 = socket(0x11, 0x2, 0x9) r4 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) accept4(r4, 0x0, &(0x7f0000000340), 0x80800) mmap(&(0x7f0000725000/0x4000)=nil, 0x4000, 0x2, 0x31, 0xffffffffffffffff, 0x8) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x1f) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x681f1a99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000e73000/0x2000)=nil, 0x2000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00027, 0x0, &(0x7f00000000c0), 0x1, 0x2000000000002) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000240)=0x1) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SG_SET_COMMAND_Q(r4, 0x2271, &(0x7f0000000440)=0x1) write(r4, &(0x7f0000000180)="e986b95d68b31e1f4073f3df9bf21c32cb45405e805d04f4673e966d4166191b6d541903f507980dfaa780bb1de90049eed61c75e06cbe934d9761afd40b817b6fbc454ed2e91b62453ddd6eb084e496fdd1a83bdc758dc227451a5d25289026adbeb626322028f8b89ada3d49adc3ba3473c02c66d9de8a", 0x78) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) ioctl$DRM_IOCTL_AGP_RELEASE(r4, 0x6431) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000500)={0x8, 0x120, 0xfa00, {0x3, {0x0, 0x3, "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", 0xf4, 0xa8, 0x0, 0x2ad1, 0x20, 0xff, 0x3ff, 0x1}, r6}}, 0x128) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) poll(&(0x7f0000000400)=[{r4}, {r5, 0x2000}, {r4, 0x410}, {0xffffffffffffffff, 0x1000}], 0x4, 0x6) bind(r3, &(0x7f00005a2000)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) [ 1609.503994] device lo entered promiscuous mode [ 1609.522191] kernel msg: ebtables bug: please report to author: entries_size too small 03:51:10 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, 0x0) [ 1609.554884] device lo left promiscuous mode 03:51:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@nat={'nat\x00', 0x19, 0x2, 0x17e, [0x20000100, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000006600000000000000000000000000000000000000000000000000000000000000ffffffff020400000d00000000000000080669726c616e300000000000000000000069705f7674693000000000000000000073797a6b616c6c65723100000000000076657468305f746f5f626f6e64000000aaaaaaaa0700000000000000ffffffffffff000000000000000070000000a0000000d80000004155444954000000000000000000000000000000000000000000080000000000080000000000000000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000ffffffff000000001f000000000000000000626f6e645f736c6176655f310000000073797a6b616c6c65723000000000000079616d3000000000000000000000000062707130000000000000000000000000aaaaaaaaaa00000000000000aaaaaaaaaabb00000000000000007000000070000000a8000000617270726570"]}, 0x1f6) [ 1609.597355] device lo entered promiscuous mode [ 1609.616566] device lo left promiscuous mode 03:51:10 executing program 2: [ 1609.658528] hfsplus: unable to find HFS+ superblock 03:51:10 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={"6c6f000000000200", 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x8}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f00000008c0)={0x0, {}, {}, {0x2, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xc7e, &(0x7f0000000800)='bridge_slave_1\x00'}) getsockopt$inet_int(r4, 0x0, 0x31, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockopt$inet_mreqsrc(r4, 0x0, 0x2f, &(0x7f0000000080)={@multicast1, @loopback, @dev}, &(0x7f00000001c0)=0xc) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @link_local}, 0x466c396f03ed0d99) dup2(r2, r0) [ 1609.708433] hfsplus: unable to find HFS+ superblock [ 1609.726220] kernel msg: ebtables bug: please report to author: entries_size too small [ 1609.788402] device lo entered promiscuous mode [ 1609.794760] device lo left promiscuous mode 03:51:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:51:12 executing program 4: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r2, 0x0) r3 = socket(0x11, 0x2, 0x9) r4 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) accept4(r4, 0x0, &(0x7f0000000340), 0x80800) mmap(&(0x7f0000725000/0x4000)=nil, 0x4000, 0x2, 0x31, 0xffffffffffffffff, 0x8) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x1f) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x681f1a99}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000e73000/0x2000)=nil, 0x2000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00027, 0x0, &(0x7f00000000c0), 0x1, 0x2000000000002) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000240)=0x1) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SG_SET_COMMAND_Q(r4, 0x2271, &(0x7f0000000440)=0x1) write(r4, &(0x7f0000000180)="e986b95d68b31e1f4073f3df9bf21c32cb45405e805d04f4673e966d4166191b6d541903f507980dfaa780bb1de90049eed61c75e06cbe934d9761afd40b817b6fbc454ed2e91b62453ddd6eb084e496fdd1a83bdc758dc227451a5d25289026adbeb626322028f8b89ada3d49adc3ba3473c02c66d9de8a", 0x78) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) ioctl$DRM_IOCTL_AGP_RELEASE(r4, 0x6431) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000500)={0x8, 0x120, 0xfa00, {0x3, {0x0, 0x3, "8b3fb069bee4e64ec854909efe532a8c618121c7c60da3a66eb9b6cdd601fbf1ae7db470d6a51bfeb3a842dd95927b443b6c4bbb5ecc81ebc094d053819bcf0eeed392f6e455c08976ab4115d5e6e4aa0305d763cdbb85bb070a2c0756eecce615bffb99bdabcc1e60b51e8ac0377956cbbe7cde073288a49c31750b960bfb0747de3a9f41218f0c8a8f6d4a22834cc5d5f33d076c41754883574068c8a71de4537c3e8e786cef0dd2fab74c936570cdcb921a502c9ae8325e374e5342a1c1bf12e501414687b0826f7d96a3df4c1c6684de35d3a274d1bae8e97bb9a52ee8c404d2251964b1120e7f50d3d0342edbebf99dc20bb09230d2247dcb232ba54dd4", 0xf4, 0xa8, 0x0, 0x2ad1, 0x20, 0xff, 0x3ff, 0x1}, r6}}, 0x128) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) poll(&(0x7f0000000400)=[{r4}, {r5, 0x2000}, {r4, 0x410}, {0xffffffffffffffff, 0x1000}], 0x4, 0x6) bind(r3, &(0x7f00005a2000)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) 03:51:12 executing program 2: 03:51:12 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0xfdfdffff, 0x0, 0x0, 0x0, 0x0) 03:51:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@nat={'nat\x00', 0x19, 0x2, 0x199, [0x20000100, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x211) 03:51:12 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={"6c6f000000000200", 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x8}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f00000008c0)={0x0, {}, {}, {0x2, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xc7e, &(0x7f0000000800)='bridge_slave_1\x00'}) getsockopt$inet_int(r4, 0x0, 0x31, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockopt$inet_mreqsrc(r4, 0x0, 0x2f, &(0x7f0000000080)={@multicast1, @loopback, @dev}, &(0x7f00000001c0)=0xc) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @link_local}, 0x466c396f03ed0d99) dup2(r2, r0) 03:51:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@nat={'nat\x00', 0x19, 0x2, 0x199, [0x20000100, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x211) 03:51:12 executing program 2: [ 1612.380906] kernel msg: ebtables bug: please report to author: entries_size too small [ 1612.398921] device lo entered promiscuous mode [ 1612.400564] hfsplus: unable to find HFS+ superblock [ 1612.466691] device lo left promiscuous mode [ 1612.475613] hfsplus: unable to find HFS+ superblock 03:51:13 executing program 2: 03:51:13 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x2200, 0x0, 0x0, 0x0, 0x0) 03:51:13 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={"6c6f000000000200", 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x8}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f00000008c0)={0x0, {}, {}, {0x2, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xc7e, &(0x7f0000000800)='bridge_slave_1\x00'}) getsockopt$inet_int(r4, 0x0, 0x31, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockopt$inet_mreqsrc(r4, 0x0, 0x2f, &(0x7f0000000080)={@multicast1, @loopback, @dev}, &(0x7f00000001c0)=0xc) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @link_local}, 0x466c396f03ed0d99) dup2(r2, r0) [ 1612.552967] kernel msg: ebtables bug: please report to author: entries_size too small 03:51:13 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) [ 1612.696182] device lo entered promiscuous mode [ 1612.726747] device lo left promiscuous mode [ 1612.728793] hfsplus: unable to find HFS+ superblock 03:51:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:51:15 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:51:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@nat={'nat\x00', 0x19, 0x2, 0x199, [0x20000100, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x211) 03:51:15 executing program 4: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r0, 0x200000) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCNXCL(r1, 0x540d) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r1, &(0x7f0000000040)={0xb0000008}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x1ff) 03:51:15 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={"6c6f000000000200"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x8}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f00000008c0)={0x0, {}, {}, {0x2, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xc7e, &(0x7f0000000800)='bridge_slave_1\x00'}) getsockopt$inet_int(r3, 0x0, 0x31, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockopt$inet_mreqsrc(r3, 0x0, 0x2f, &(0x7f0000000080)={@multicast1, @loopback, @dev}, &(0x7f00000001c0)=0xc) dup2(r1, r0) 03:51:15 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0xe82, 0x0, 0x0, 0x0, 0x0) 03:51:16 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x0) [ 1615.431152] kernel msg: ebtables bug: please report to author: entries_size too small 03:51:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@nat={'nat\x00', 0x19, 0x2, 0x1a7, [0x20000100, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000006600000000000000000000000000000000000000000000000000000000000000ffffffff020400000d00000000000000080669726c616e300000000000000000000069705f7674693000000000000000000073797a6b616c6c65723100000000000076657468305f746f5f626f6e64000000aaaaaaaa0700000000000000ffffffffffff000000000000000070000000a0000000d80000004155444954000000000000000000000000000000000000000000080000000000080000000000000000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000ffffffff000000001f000000000000000000626f6e645f736c6176655f310000000073797a6b616c6c65723000000000000079616d3000000000000000000000000062707130000000000000000000000000aaaaaaaaaa00000000000000aaaaaaaaaabb00000000000000007000000070000000a80000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa00"]}, 0x21f) [ 1615.474229] hfsplus: unable to find HFS+ superblock 03:51:16 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000100)={@multicast2, @remote}, 0xc) syz_open_procfs(0x0, 0x0) 03:51:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:51:16 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={"6c6f000000000200"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x8}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f00000008c0)={0x0, {}, {}, {0x2, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xc7e, &(0x7f0000000800)='bridge_slave_1\x00'}) getsockopt$inet_int(r3, 0x0, 0x31, &(0x7f0000000000), &(0x7f0000000040)=0x4) dup2(r1, r0) [ 1615.535398] kernel msg: ebtables bug: please report to author: entries_size too small [ 1615.572152] hfsplus: unable to find HFS+ superblock 03:51:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@nat={'nat\x00', 0x19, 0x2, 0x1a7, [0x20000100, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x21f) 03:51:16 executing program 4: socket$inet(0x10, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x50) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = socket$key(0xf, 0x3, 0x2) getegid() perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0x7, 0x0, 0x6512dd2a, 0xfffffffffffffffd, 0x3, 0x10001, 0x7ec5, 0x0, 0x0, 0xffffffffffff9a6a, 0x0, 0x0, 0x4, 0x60000000, 0x4b95, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, 0x8, 0xffffffffffffff00, 0x6, 0xc1, 0xffffffffffffffeb, 0x4, 0x0, 0x6, 0x4, @perf_config_ext={0x7, 0x3f}, 0x20, 0xffffffffffff8c04, 0x8001, 0x2, 0x1, 0x0, 0xd8}, 0x0, 0xf, 0xffffffffffffffff, 0x9) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000240)={'ip_vti0\x00', {0x2, 0x4e20, @multicast2}}) socket$inet6(0xa, 0x2, 0x0) pipe2(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x141200, 0x0) renameat2(r3, &(0x7f0000000400)='./file0\x00', r4, &(0x7f0000000480)='./file0\x00', 0x2) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000380)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) dup3(r2, r1, 0x80000) syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x2) r5 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) sendfile(0xffffffffffffffff, r5, 0x0, 0x400) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r5) sendfile(r0, r5, &(0x7f0000000180)=0x6, 0x2000005) 03:51:16 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, 0x0) 03:51:16 executing program 2: 03:51:16 executing program 2: [ 1615.757003] kernel msg: ebtables bug: please report to author: entries_size too small [ 1615.774408] hfsplus: unable to find HFS+ superblock 03:51:16 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={"6c6f000000000200"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x8}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f00000008c0)={0x0, {}, {}, {0x2, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xc7e, &(0x7f0000000800)='bridge_slave_1\x00'}) dup2(r1, r0) 03:51:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@nat={'nat\x00', 0x19, 0x2, 0x1a7, [0x20000100, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x21f) 03:51:16 executing program 2: [ 1615.851034] hfsplus: unable to find HFS+ superblock 03:51:16 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x0, 0x0) [ 1615.912213] kernel msg: ebtables bug: please report to author: entries_size too small 03:51:16 executing program 2: [ 1616.069007] hfsplus: unable to find HFS+ superblock [ 1616.122897] hfsplus: unable to find HFS+ superblock 03:51:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:51:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@nat={'nat\x00', 0x19, 0x2, 0x1ae, [0x20000100, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x226) 03:51:19 executing program 2: 03:51:19 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={"6c6f000000000200"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x8}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r1, r0) 03:51:19 executing program 4: socket$inet(0x10, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x50) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = socket$key(0xf, 0x3, 0x2) getegid() perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0x7, 0x0, 0x6512dd2a, 0xfffffffffffffffd, 0x3, 0x10001, 0x7ec5, 0x0, 0x0, 0xffffffffffff9a6a, 0x0, 0x0, 0x4, 0x60000000, 0x4b95, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, 0x8, 0xffffffffffffff00, 0x6, 0xc1, 0xffffffffffffffeb, 0x4, 0x0, 0x6, 0x4, @perf_config_ext={0x7, 0x3f}, 0x20, 0xffffffffffff8c04, 0x8001, 0x2, 0x1, 0x0, 0xd8}, 0x0, 0xf, 0xffffffffffffffff, 0x9) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000240)={'ip_vti0\x00', {0x2, 0x4e20, @multicast2}}) socket$inet6(0xa, 0x2, 0x0) pipe2(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x141200, 0x0) renameat2(r3, &(0x7f0000000400)='./file0\x00', r4, &(0x7f0000000480)='./file0\x00', 0x2) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000380)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) dup3(r2, r1, 0x80000) syz_open_dev$binder(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x2) r5 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) sendfile(0xffffffffffffffff, r5, 0x0, 0x400) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r5) sendfile(r0, r5, &(0x7f0000000180)=0x6, 0x2000005) 03:51:19 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, 0x0) 03:51:19 executing program 2: [ 1618.690983] kernel msg: ebtables bug: please report to author: entries_size too small [ 1618.715263] hfsplus: unable to find HFS+ superblock 03:51:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@nat={'nat\x00', 0x19, 0x2, 0x1ae, [0x20000100, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000006600000000000000000000000000000000000000000000000000000000000000ffffffff020400000d00000000000000080669726c616e300000000000000000000069705f7674693000000000000000000073797a6b616c6c65723100000000000076657468305f746f5f626f6e64000000aaaaaaaa0700000000000000ffffffffffff000000000000000070000000a0000000d80000004155444954000000000000000000000000000000000000000000080000000000080000000000000000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000ffffffff000000001f000000000000000000626f6e645f736c6176655f310000000073797a6b616c6c65723000000000000079616d3000000000000000000000000062707130000000000000000000000000aaaaaaaaaa00000000000000aaaaaaaaaabb00000000000000007000000070000000a80000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa0000000000000000"]}, 0x226) 03:51:19 executing program 2: setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x800200000000001, 0x0) ioctl$int_out(r0, 0x5460, &(0x7f0000fd3ffc)) 03:51:19 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={"6c6f000000000200"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x8}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r0) [ 1618.804005] hfsplus: unable to find HFS+ superblock 03:51:19 executing program 2: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1000, 0x0) 03:51:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x139) [ 1618.875471] kernel msg: ebtables bug: please report to author: entries_size too small 03:51:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) 03:51:22 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x5000000, 0x0, 0x0, 0x0, 0x0) 03:51:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@nat={'nat\x00', 0x19, 0x2, 0x1ae, [0x20000100, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x226) 03:51:22 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={"6c6f000000000200"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x8}, 0x0) dup2(r1, r0) 03:51:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:51:22 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4000, 0x0) openat$cgroup_type(r1, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) setsockopt$inet6_mtu(r1, 0x29, 0x17, 0x0, 0x0) sendfile(r1, r3, &(0x7f0000000400), 0x3) close(r3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) [ 1621.730997] hfsplus: unable to find HFS+ superblock [ 1621.741739] kernel msg: ebtables bug: please report to author: entries_size too small 03:51:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000280)={0x0, 0x8000}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="00000f"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000003000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:51:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@nat={'nat\x00', 0x19, 0x2, 0x1b1, [0x20000100, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x229) [ 1621.797066] hfsplus: unable to find HFS+ superblock 03:51:22 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={"6c6f000000000200"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r1, r0) 03:51:22 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x600, 0x0, 0x0, 0x0, 0x0) 03:51:22 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) r1 = memfd_create(&(0x7f0000000380)='#vmnet1nodevem1\x00', 0x0) write(r1, &(0x7f0000000100)='.', 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f00000000c0)) 03:51:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1621.953439] kernel msg: ebtables bug: please report to author: entries_size too small [ 1621.992203] hfsplus: unable to find HFS+ superblock 03:51:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@nat={'nat\x00', 0x19, 0x2, 0x1b1, [0x20000100, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000006600000000000000000000000000000000000000000000000000000000000000ffffffff020400000d00000000000000080669726c616e300000000000000000000069705f7674693000000000000000000073797a6b616c6c65723100000000000076657468305f746f5f626f6e64000000aaaaaaaa0700000000000000ffffffffffff000000000000000070000000a0000000d80000004155444954000000000000000000000000000000000000000000080000000000080000000000000000000000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000ffffffff000000001f000000000000000000626f6e645f736c6176655f310000000073797a6b616c6c65723000000000000079616d3000000000000000000000000062707130000000000000000000000000aaaaaaaaaa00000000000000aaaaaaaaaabb00000000000000007000000070000000a80000006172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa0000000000000000000000"]}, 0x229) 03:51:22 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={"6c6f000000000200"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(r1, r0) [ 1622.067434] hfsplus: unable to find HFS+ superblock 03:51:22 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x4, 0x0, 0x0, 0x0, 0x0) 03:51:22 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000005c0)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 03:51:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@nat={'nat\x00', 0x19, 0x2, 0x1b1, [0x20000100, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x229) [ 1622.165309] kernel msg: ebtables bug: please report to author: entries_size too small [ 1622.230246] kernel msg: ebtables bug: please report to author: entries_size too small [ 1622.298729] hfsplus: unable to find HFS+ superblock [ 1622.394179] hfsplus: unable to find HFS+ superblock [ 1622.519999] audit: type=1804 audit(2000001083.051:1401): pid=29662 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir897496843/syzkaller.xtHmBG/494/file0" dev="sda1" ino=16947 res=1 [ 1622.550966] audit: type=1804 audit(2000001083.081:1402): pid=29666 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir897496843/syzkaller.xtHmBG/494/file0" dev="sda1" ino=16947 res=1 03:51:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@nat={'nat\x00', 0x19, 0x2, 0x1b3, [0x20000100, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x22b) 03:51:23 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={"6c6f000000000200"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) 03:51:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 03:51:23 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x0, 0x0) 03:51:23 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0xb1, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) write$binfmt_elf32(r0, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) [ 1622.690942] audit: type=1804 audit(2000001083.221:1403): pid=29710 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir897496843/syzkaller.xtHmBG/494/file0" dev="sda1" ino=16947 res=1 03:51:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@nat={'nat\x00', 0x19, 0x2, 0x1b3, [0x20000100, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x22b) [ 1622.784661] kernel msg: ebtables bug: please report to author: entries_size too small [ 1622.811456] hfsplus: unable to find HFS+ superblock [ 1622.869915] hfsplus: unable to find HFS+ superblock [ 1622.930675] kernel msg: ebtables bug: please report to author: entries_size too small 03:51:25 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0) 03:51:25 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={"6c6f000000000200"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) 03:51:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) close(r0) 03:51:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@nat={'nat\x00', 0x19, 0x2, 0x1b3, [0x20000100, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x22b) 03:51:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:51:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) [ 1625.161340] kernel msg: ebtables bug: please report to author: entries_size too small [ 1625.177947] hfsplus: unable to find HFS+ superblock 03:51:25 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x68000000, 0x0, 0x0, 0x0, 0x0) 03:51:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-sse2\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000000)="8bfb10e87e18e5c212583bd17b131ad37d", 0x11, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000040)=""/72, 0xb9aedb) 03:51:25 executing program 5: 03:51:25 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={"6c6f000000000200"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) 03:51:25 executing program 5: [ 1625.377724] hfsplus: unable to find HFS+ superblock [ 1625.422109] hfsplus: unable to find HFS+ superblock 03:51:26 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={"6c6f000000000200"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, r0) 03:51:26 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x10d, 0x0, 0x0, 0x0, 0x0) 03:51:26 executing program 5: 03:51:26 executing program 2: 03:51:26 executing program 5: [ 1625.583590] hfsplus: unable to find HFS+ superblock [ 1625.653235] hfsplus: unable to find HFS+ superblock 03:51:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:51:28 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(r1, r0) 03:51:28 executing program 2: 03:51:28 executing program 5: 03:51:28 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0) 03:51:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 03:51:28 executing program 2: [ 1628.259308] hfsplus: unable to find HFS+ superblock 03:51:28 executing program 5: 03:51:28 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup2(r0, 0xffffffffffffffff) [ 1628.325507] hfsplus: unable to find HFS+ superblock 03:51:28 executing program 2: 03:51:28 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x8000a0ffffffff, 0x0, 0x0, 0x0, 0x0) 03:51:28 executing program 5: [ 1628.533366] hfsplus: unable to find HFS+ superblock [ 1628.606886] hfsplus: unable to find HFS+ superblock 03:51:31 executing program 2: 03:51:31 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(r1, r0) 03:51:31 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x400000000003, 0x0, &(0x7f00001f0ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x492492492492565, 0x0) recvmmsg(r2, &(0x7f0000002840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) 03:51:31 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x48, 0x0, 0x0, 0x0, 0x0) 03:51:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:51:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 03:51:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffffffffffffffd}]}) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r0, &(0x7f0000000500)={0x2, 0x4e23, @multicast1}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000600)=@in={0x2, 0x4e24, @multicast2}, 0x80, &(0x7f0000001480)=[{0x0}], 0x1}, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0xffffff4b) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) write$binfmt_elf64(r0, &(0x7f0000000cc0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], [], []]}, 0x378) chdir(0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) creat(0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 03:51:31 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(r1, r0) [ 1631.369163] hfsplus: unable to find HFS+ superblock [ 1631.388720] audit: type=1326 audit(2000001091.925:1404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29835 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 03:51:31 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x800000, 0x0) chdir(&(0x7f0000000200)='./file0\x00') r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000c80)={0x8, "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", 0x1000}, 0x1006) sendfile(r0, r0, &(0x7f0000d83ff8), 0x2008000fffffffe) chdir(&(0x7f0000000000)='./file0\x00') bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080), 0x4) getresuid(&(0x7f0000000140)=0x0, &(0x7f0000000240), 0x0) write$P9_RSTATu(r0, &(0x7f0000000380)={0x69, 0x7d, 0x2, {{0x0, 0x54, 0x7b75, 0x401, {0x40, 0x0, 0x5}, 0x0, 0x9, 0x1ff, 0xf, 0x10, '/selinux/policy\x00', 0x7, 'selinux', 0x4, '/em1', 0x6, 'ramfs\x00'}, 0x0, "", r1}}, 0x69) openat$zero(0xffffffffffffff9c, 0x0, 0x2000, 0x0) getpgid(0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) 03:51:32 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, &(0x7f00000000c0), 0x2c3) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000200)=""/181, 0xb5}], 0x1) [ 1631.470672] hfsplus: unable to find HFS+ superblock 03:51:32 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, r0) 03:51:32 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x0, 0x0) 03:51:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:51:32 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x16) [ 1631.710255] hfsplus: unable to find HFS+ superblock 03:51:32 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(r1, r0) 03:51:32 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x0, 0x0) 03:51:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1631.901677] hfsplus: unable to find HFS+ superblock [ 1632.012595] audit: type=1326 audit(2000001092.556:1405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29876 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 03:51:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 03:51:32 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(r1, r0) 03:51:32 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x7400000000000000, 0x0, 0x0, 0x0, 0x0) [ 1632.280217] hfsplus: unable to find HFS+ superblock [ 1632.359570] hfsplus: unable to find HFS+ superblock 03:51:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x0, 0x0, 0x0, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) 03:51:33 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(r1, r0) 03:51:33 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0xfdffffff00000000, 0x0, 0x0, 0x0, 0x0) [ 1632.577374] hfsplus: unable to find HFS+ superblock 03:51:33 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) dup2(r1, r0) [ 1632.645374] hfsplus: unable to find HFS+ superblock [ 1632.683409] REISERFS warning (device loop5): sh-2006 read_super_block: bread failed (dev loop5, block 2, size 4096) [ 1632.707357] REISERFS warning (device loop5): sh-2006 read_super_block: bread failed (dev loop5, block 16, size 4096) [ 1632.721249] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 [ 1632.810195] audit: type=1326 audit(2000001093.356:1406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=29876 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 1632.852895] REISERFS warning (device loop5): sh-2006 read_super_block: bread failed (dev loop5, block 2, size 4096) [ 1632.877846] REISERFS warning (device loop5): sh-2006 read_super_block: bread failed (dev loop5, block 16, size 4096) [ 1632.893384] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 03:51:35 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x0, 0x0) 03:51:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 03:51:35 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) dup2(r1, r0) 03:51:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:51:35 executing program 2: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_robust_list(0x0, 0x0) r1 = socket(0x11, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'ip6_vti0\x00', 0x0}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000003dc0)=0x4, 0x4) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000180)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000040)={0x0, 0x0, 0x200, 0x0, '\x00', 0x8}) sendmmsg$inet_sctp(r1, &(0x7f0000871fc8)=[{&(0x7f000086c000)=@in6={0xa, 0x0, 0x2}, 0x1c, &(0x7f0000d1e000), 0x0, &(0x7f0000dda000)}], 0x492492492492510, 0x0) 03:51:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x0, 0x0, 0x0, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) [ 1634.836970] hfsplus: unable to find HFS+ superblock 03:51:35 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) dup2(r1, r0) 03:51:35 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0xd000000, 0x0, 0x0, 0x0, 0x0) 03:51:35 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(0xffffffffffffffff, r0) [ 1635.034428] REISERFS warning (device loop5): sh-2006 read_super_block: bread failed (dev loop5, block 2, size 4096) [ 1635.057553] REISERFS warning (device loop5): sh-2006 read_super_block: bread failed (dev loop5, block 16, size 4096) [ 1635.096148] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 [ 1635.115033] hfsplus: unable to find HFS+ superblock [ 1635.163986] hfsplus: unable to find HFS+ superblock 03:51:35 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x10000000, 0x0, 0x0, 0x0, 0x0) 03:51:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x0, 0x0, 0x0, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) 03:51:35 executing program 0: socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup2(r0, 0xffffffffffffffff) [ 1635.417653] hfsplus: unable to find HFS+ superblock 03:51:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) [ 1635.488915] REISERFS warning (device loop5): sh-2006 read_super_block: bread failed (dev loop5, block 2, size 4096) [ 1635.511699] REISERFS warning (device loop5): sh-2006 read_super_block: bread failed (dev loop5, block 16, size 4096) [ 1635.537028] hfsplus: unable to find HFS+ superblock [ 1635.539214] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 03:51:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 03:51:36 executing program 0: clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/loop0'], 0x0, &(0x7f0000000000)='vfat\x00', 0x0, 0x0) 03:51:36 executing program 2: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_robust_list(0x0, 0x0) r1 = socket(0x11, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'ip6_vti0\x00', 0x0}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000003dc0)=0x4, 0x4) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000180)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000040)={0x0, 0x0, 0x200, 0x0, '\x00', 0x8}) sendmmsg$inet_sctp(r1, &(0x7f0000871fc8)=[{&(0x7f000086c000)=@in6={0xa, 0x0, 0x2}, 0x1c, &(0x7f0000d1e000), 0x0, &(0x7f0000dda000)}], 0x492492492492510, 0x0) 03:51:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:51:38 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 03:51:38 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f00000000c0)={{}, 'port1\x00'}) 03:51:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x58e, 0x0, 0x0, 0x0, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) 03:51:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0x0) 03:51:38 executing program 2: perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18490, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1637.834169] hfsplus: unable to find HFS+ superblock 03:51:38 executing program 0: 03:51:38 executing program 2: 03:51:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 03:51:38 executing program 0: [ 1637.951754] hfsplus: unable to find HFS+ superblock [ 1637.960054] REISERFS warning (device loop5): sh-2006 read_super_block: bread failed (dev loop5, block 2, size 4096) [ 1637.982427] REISERFS warning (device loop5): sh-2006 read_super_block: bread failed (dev loop5, block 16, size 4096) 03:51:38 executing program 0: [ 1637.994192] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 03:51:38 executing program 2: 03:51:41 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x2c, 0x0, 0x0, 0x0, 0x0) 03:51:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000940)="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") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0xc, 0x10011, r2, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f0000000400)) 03:51:41 executing program 5: 03:51:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000500)={0x1}, 0x8) 03:51:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:51:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 03:51:41 executing program 5: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 1640.907246] hfsplus: unable to find HFS+ superblock 03:51:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000780)=ANY=[@ANYBLOB], 0x1}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r3, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a0676ffffff81004e220000000058000b4824ca944f64009400050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 03:51:41 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x21, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 1640.999622] hfsplus: unable to find HFS+ superblock [ 1641.034581] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:51:41 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0xd010000, 0x0, 0x0, 0x0, 0x0) 03:51:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:51:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000240)="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") r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xfffffffffffffffc, 0x12, r0, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, 0x0, &(0x7f0000000040)) [ 1641.153088] dccp_invalid_packet: P.Data Offset(68) too large [ 1641.167863] dccp_invalid_packet: P.Data Offset(68) too large [ 1641.219280] hfsplus: unable to find HFS+ superblock 03:51:41 executing program 2: [ 1641.273101] hfsplus: unable to find HFS+ superblock 03:51:41 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0xffffff7f, 0x0, 0x0, 0x0, 0x0) 03:51:41 executing program 0: 03:51:41 executing program 5: 03:51:41 executing program 2: [ 1641.440389] hfsplus: unable to find HFS+ superblock [ 1641.514196] hfsplus: unable to find HFS+ superblock 03:51:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 03:51:42 executing program 0: 03:51:42 executing program 5: 03:51:42 executing program 2: 03:51:42 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x6800, 0x0, 0x0, 0x0, 0x0) [ 1641.700050] hfsplus: unable to find HFS+ superblock [ 1641.748855] hfsplus: unable to find HFS+ superblock 03:51:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:51:44 executing program 2: 03:51:44 executing program 0: 03:51:44 executing program 5: 03:51:44 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x6b6b6b00, 0x0, 0x0, 0x0, 0x0) 03:51:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 03:51:44 executing program 0: 03:51:44 executing program 2: 03:51:44 executing program 5: r0 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/current\x00', 0x2, 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000000)="aa", 0x1}], 0x1, 0x0) [ 1644.263645] hfsplus: unable to find HFS+ superblock 03:51:44 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10) [ 1644.340695] hfsplus: unable to find HFS+ superblock 03:51:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_SET_PIT2(r1, 0xae71, &(0x7f0000000100)) 03:51:44 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0xd00000000000000, 0x0, 0x0, 0x0, 0x0) [ 1644.543284] hfsplus: unable to find HFS+ superblock 03:51:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:51:47 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_PIT2(r1, 0x4018aebd, &(0x7f0000000100)) 03:51:47 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@nat={'nat\x00', 0x3c1, 0x2, 0x260, [0x20000140], 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]}, 0x2d8) 03:51:47 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) ftruncate(r0, 0x0) 03:51:47 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x9000000, 0x0, 0x0, 0x0, 0x0) 03:51:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 03:51:47 executing program 2: [ 1647.323116] hfsplus: unable to find HFS+ superblock 03:51:47 executing program 0: 03:51:47 executing program 5: [ 1647.397735] hfsplus: unable to find HFS+ superblock 03:51:48 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x42440000, 0x0, 0x0, 0x0, 0x0) 03:51:48 executing program 2: 03:51:48 executing program 0: 03:51:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:51:48 executing program 5: 03:51:48 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x100000224) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, &(0x7f00000001c0)) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) [ 1647.650038] hfsplus: unable to find HFS+ superblock 03:51:48 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000680)) 03:51:48 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x7a00, 0x0, 0x0, 0x0, 0x0) [ 1647.862637] hfsplus: unable to find HFS+ superblock 03:51:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 03:51:48 executing program 5: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f0000000680)="fa", 0x1}], 0x1, 0x0) 03:51:48 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000280)={0x0, 0x100000001}) unshare(0x0) 03:51:48 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x23000000, 0x0, 0x0, 0x0, 0x0) 03:51:48 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) getsockopt$inet6_mtu(r0, 0x29, 0x17, 0x0, &(0x7f00000002c0)) 03:51:48 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x900, 0x0) getpeername(r0, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x80) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000480)={@ipv4={[], [], @broadcast}, @mcast2, @loopback, 0xfffffffffffffffe, 0x7fe6, 0x5, 0x100, 0x1000, 0x10004, r3}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0x9}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x1, 0x0, @loopback}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@mcast2, 0xa98, 0x0, 0x1, 0x0, 0x6f, 0x0, 0x3d1a}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1648.175071] hfsplus: unable to find HFS+ superblock 03:51:48 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x48000000, 0x0, 0x0, 0x0, 0x0) [ 1648.284887] hfsplus: unable to find HFS+ superblock 03:51:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:51:51 executing program 0: pipe(&(0x7f0000000000)) flock(0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) delete_module(&(0x7f0000000300)='security#&!\x00', 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x10006}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x1, 0x200000000000000, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) 03:51:51 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x0, 0x0) 03:51:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) shutdown(0xffffffffffffffff, 0x0) 03:51:51 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x5}, 0x2b) 03:51:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) [ 1650.683666] hfsplus: unable to find HFS+ superblock 03:51:51 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 03:51:51 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, 0x0) 03:51:51 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) execve(0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) sendfile(r0, r1, &(0x7f0000000180)=0x6, 0x2000005) fsetxattr(r0, &(0x7f0000000580)=@known='trusted.overlay.impure\x00', &(0x7f00000005c0)='/dev/loop#\x00', 0xb, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x800000000023, &(0x7f0000b56f40)=""/192, &(0x7f0000000000)=0x442) recvfrom(r1, &(0x7f00000008c0)=""/57, 0x7, 0x20, &(0x7f0000000fc0)=@llc={0x1a, 0x33f, 0xe, 0xffffffffffff5b32, 0x6, 0x1, @random="407834ce5f34"}, 0x80) 03:51:51 executing program 0: socket$inet(0x10, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sendfile(r0, r1, &(0x7f0000000180)=0x6, 0x2000005) fsetxattr(r0, &(0x7f0000000580)=@known='trusted.overlay.impure\x00', &(0x7f00000005c0)='/dev/loop#\x00', 0xb, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/checkreqprot\x00', 0x0, 0x0) flistxattr(r1, &(0x7f0000000380)=""/249, 0xf9) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000840)={'veth1\x00', {0x2, 0x4e21, @multicast2}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) [ 1650.845802] hfsplus: unable to find HFS+ superblock 03:51:51 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x5, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000240], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x3, 0xfffffffffffffffe}]}, 0x108) 03:51:51 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x3, 0x0, 0x0, 0x0, 0x0) [ 1650.939284] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 1651.031204] hfsplus: unable to find HFS+ superblock [ 1651.088432] hfsplus: unable to find HFS+ superblock 03:51:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:51:54 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000db4fb6)={@broadcast, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @broadcast}, @icmp=@timestamp}}}}, 0x0) 03:51:54 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x5, 0x240, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000240], 0x0, 0x0, &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x11, 0xa40aaf23d22d4ef6, 0x60, 'bond0\x00', 'yam0\x00', 'syzkaller1\x00', 'vcan0\x00', @broadcast, [0xff, 0xff, 0x0, 0x0, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0x70, 0xa0, 0xf0}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x100000001}}}]}, @common=@log={'log\x00', 0x28, {{0xccbf, "246649873c4c2d73aae7a30a3aa91f9c2f9bc37d79f2b63a56a9210706f6", 0xf}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'veth1_to_bond\x00', 'yam0\x00', 'lo\x00', 'bond0\x00', @remote, [], @local, [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}]}, 0x2b8) 03:51:54 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000002880)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[{0xc}], 0xc}}], 0x1, 0x0) 03:51:54 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x53540000, 0x0, 0x0, 0x0, 0x0) 03:51:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 03:51:54 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x800452d3, &(0x7f0000000100)) [ 1653.746720] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 03:51:54 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x4, 0x4000000000004, 0x8}, 0x2c) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000000)={0x9}, 0xc) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x18) 03:51:54 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000340)='pagemap\x00') read$eventfd(r0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1653.797595] hfsplus: unable to find HFS+ superblock [ 1653.850974] hfsplus: unable to find HFS+ superblock 03:51:54 executing program 5: 03:51:54 executing program 2: 03:51:54 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x2c000000, 0x0, 0x0, 0x0, 0x0) [ 1654.030644] hfsplus: unable to find HFS+ superblock [ 1654.102249] hfsplus: unable to find HFS+ superblock 03:51:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:51:57 executing program 0: 03:51:57 executing program 5: 03:51:57 executing program 2: 03:51:57 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, 0x0) 03:51:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 03:51:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000100)='./file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 03:51:57 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00007e5000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000bc000)=@abs, 0x8) fcntl$setstatus(r1, 0x4, 0x800042c05) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) [ 1656.837774] hfsplus: unable to find HFS+ superblock 03:51:57 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000440)=""/26, &(0x7f0000000480)=0x1a) [ 1656.908470] hfsplus: unable to find HFS+ superblock 03:51:57 executing program 0: clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r0 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000380), 0x0, 0x1000) 03:51:57 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x4c00000000000000, 0x0, 0x0, 0x0, 0x0) 03:51:57 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x4240, 0x0) [ 1657.063819] hfsplus: unable to find HFS+ superblock 03:52:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:52:00 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, 0x0) inotify_init1(0x0) ptrace(0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) keyctl$update(0x2, 0x0, 0x0, 0x155) 03:52:00 executing program 5: 03:52:00 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x6000000000000000, 0x0, 0x0, 0x0, 0x0) 03:52:00 executing program 0: 03:52:00 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) [ 1659.862324] hfsplus: unable to find HFS+ superblock 03:52:00 executing program 5: 03:52:00 executing program 0: [ 1659.937935] hfsplus: unable to find HFS+ superblock 03:52:00 executing program 2: 03:52:00 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, 0x0) 03:52:00 executing program 0: 03:52:00 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) open(&(0x7f0000021000)='./file0\x00', 0x3fffe, 0x0) [ 1660.061072] hfsplus: unable to find HFS+ superblock [ 1660.114233] hfsplus: unable to find HFS+ superblock 03:52:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:52:03 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x81) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x1, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) 03:52:03 executing program 0: socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x81) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0x9}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x1, 0x0, @loopback}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@ipv4={[], [], @broadcast}, 0xa98, 0x0, 0x1, 0x8, 0x70, 0xa2c7, 0x3d1a}, &(0x7f00000001c0)=0x20) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) 03:52:03 executing program 5: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000004fc0)) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 03:52:03 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x0, 0x0) 03:52:03 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) [ 1662.951359] hfsplus: unable to find HFS+ superblock 03:52:03 executing program 5: io_setup(0x4, &(0x7f00000003c0)=0x0) io_cancel(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 03:52:03 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, 0x0) 03:52:03 executing program 5: umount2(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1663.121561] hfsplus: unable to find HFS+ superblock 03:52:03 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x23, 0x0, 0x0, 0x0, 0x0) 03:52:03 executing program 5: 03:52:03 executing program 5: [ 1663.313013] hfsplus: unable to find HFS+ superblock [ 1663.371037] hfsplus: unable to find HFS+ superblock 03:52:06 executing program 0: socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x81) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0x9}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x1, 0x0, @loopback}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@ipv4={[], [], @broadcast}, 0xa98, 0x0, 0x1, 0x8, 0x70, 0xa2c7, 0x3d1a}, &(0x7f00000001c0)=0x20) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) 03:52:06 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x81) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x1, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) 03:52:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:52:06 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 03:52:06 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x0, 0x0) 03:52:06 executing program 5: socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x81) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0x9}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x1, 0x0, @loopback}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@ipv4={[], [], @broadcast}, 0xa98, 0x0, 0x1, 0x8, 0x70, 0xa2c7, 0x3d1a}, &(0x7f00000001c0)=0x20) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) [ 1665.986528] hfsplus: unable to find HFS+ superblock 03:52:06 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6c, 0x0, 0x0, 0x0) 03:52:06 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xd, 0x0, 0x0, 0x0) 03:52:06 executing program 0: socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x81) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0x9}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x1, 0x0, @loopback}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@ipv4={[], [], @broadcast}, 0xa98, 0x0, 0x1, 0x8, 0x70, 0xa2c7, 0x3d1a}, &(0x7f00000001c0)=0x20) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) 03:52:06 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2c00000000000000, 0x0, 0x0, 0x0) 03:52:06 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x81) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x1, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) 03:52:06 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xe000000000000, 0x0, 0x0, 0x0) 03:52:06 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x0, 0x0) 03:52:07 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 03:52:09 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x81) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x1, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) 03:52:09 executing program 0: 03:52:09 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x820e0000, 0x0, 0x0, 0x0) 03:52:09 executing program 2: 03:52:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:52:09 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 03:52:09 executing program 2: 03:52:09 executing program 0: 03:52:09 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xe0000, 0x0, 0x0, 0x0) 03:52:09 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x0, 0x0, 0x1ffffffffc}) 03:52:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0xa8c6) sendto$inet6(r0, 0x0, 0x0, 0x20000007, &(0x7f0000000240)={0xa, 0x4e22}, 0x1c) close(r0) 03:52:09 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x9, 0x0, 0x0, 0x0) 03:52:10 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:52:10 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000080), &(0x7f00000000c0)=0x40) sched_setaffinity(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000040)='system_u:object_r:dhcpc_var_run_t:s0\x00', 0x25, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) getsockname(0xffffffffffffff9c, 0x0, 0x0) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getuid() openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0x9) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) sendmmsg(r2, &(0x7f00000002c0), 0x400000000000174, 0x0) 03:52:10 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x200000000000009}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x1c) fcntl$setflags(r1, 0x2, 0x0) 03:52:10 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5354000000000000, 0x0, 0x0, 0x0) [ 1669.599789] audit: type=1400 audit(2000001130.154:1407): avc: denied { relabelto } for pid=30537 comm="syz-executor2" name="TCPv6" dev="sockfs" ino=182132 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:dhcpc_var_run_t:s0 tclass=tcp_socket permissive=1 03:52:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:52:12 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 03:52:12 executing program 0: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)="237d009a1bc25f52ead3dd54d0ec3ba49d563ea411a4ac9e1eacaa54d5d3f83cd759620449dc742c26e930a8afffd3cdcd2d9027a276ba6ca36c22a047eb441d8c8e158d6060b2db9e27ef5fde3f69ac6c03aadc2896be649b1d9513bee7b8a3133edd7d87c759f192e342496b79e885e95e1db2d259636e9daf51b102997a81ffc2dd29fe27b8225840d62cb5a6a2e13aec471dfe8685e7d4f62143a3cff353ea41d711c94f8e2b948c1fd68897d0dd2a902922da", 0x0) ftruncate(r1, 0x40001) sendfile(r0, r1, 0x0, 0x100000000002) 03:52:12 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x482b0000, 0x0, 0x0, 0x0) 03:52:12 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000080), &(0x7f00000000c0)=0x40) sched_setaffinity(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000040)='system_u:object_r:dhcpc_var_run_t:s0\x00', 0x25, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) getsockname(0xffffffffffffff9c, 0x0, 0x0) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getuid() openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0x9) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) sendmmsg(r2, &(0x7f00000002c0), 0x400000000000174, 0x0) 03:52:12 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000280)=@in={0x2, 0x4e22}, 0x80, 0x0, 0x0, &(0x7f0000000340)=[{0x38, 0x0, 0x7, "44240f0300013c14eda95340ed7ed5c9e82fc03e83481540fecc30356e9c19e16c"}], 0x38}, 0x0) 03:52:12 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2300, 0x0, 0x0, 0x0) 03:52:12 executing program 5: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @random="1fbb34b8e44f", [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0xffffff6c, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff83, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4888], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 03:52:12 executing program 0: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)="237d009a1bc25f52ead3dd54d0ec3ba49d563ea411a4ac9e1eacaa54d5d3f83cd759620449dc742c26e930a8afffd3cdcd2d9027a276ba6ca36c22a047eb441d8c8e158d6060b2db9e27ef5fde3f69ac6c03aadc2896be649b1d9513bee7b8a3133edd7d87c759f192e342496b79e885e95e1db2d259636e9daf51b102997a81ffc2dd29fe27b8225840d62cb5a6a2e13aec471dfe8685e7d4f62143a3cff353ea41d711c94f8e2b948c1fd68897d0dd2a902922da", 0x0) ftruncate(r1, 0x40001) sendfile(r0, r1, 0x0, 0x100000000002) 03:52:12 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2c, 0x0, 0x0, 0x0) 03:52:13 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x8010400000031) 03:52:13 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x0, 0x0) 03:52:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:52:15 executing program 0: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)="237d009a1bc25f52ead3dd54d0ec3ba49d563ea411a4ac9e1eacaa54d5d3f83cd759620449dc742c26e930a8afffd3cdcd2d9027a276ba6ca36c22a047eb441d8c8e158d6060b2db9e27ef5fde3f69ac6c03aadc2896be649b1d9513bee7b8a3133edd7d87c759f192e342496b79e885e95e1db2d259636e9daf51b102997a81ffc2dd29fe27b8225840d62cb5a6a2e13aec471dfe8685e7d4f62143a3cff353ea41d711c94f8e2b948c1fd68897d0dd2a902922da", 0x0) ftruncate(r1, 0x40001) sendfile(r0, r1, 0x0, 0x100000000002) 03:52:15 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x8010400000031) 03:52:15 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2200000000000000, 0x0, 0x0, 0x0) 03:52:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 03:52:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000080)='team0\x00') r1 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) bind$packet(r1, &(0x7f00000003c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 03:52:15 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x482b, 0x0, 0x0, 0x0) 03:52:15 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x8010400000031) 03:52:16 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x0, 0x0) 03:52:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000240)={"66696c746572000000000000000000000000000000000000000100", 0x4}, 0x68) 03:52:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000080)='team0\x00') r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@dellink={0x34, 0x11, 0x201, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'team0\x00\x00\x00\x00\x00\x00\x00?\x00'}]}, 0x34}}, 0x0) 03:52:16 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x8010400000031) 03:52:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 03:52:16 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x0, 0x0) 03:52:16 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xff0f0000, 0x0, 0x0, 0x0) 03:52:16 executing program 0: 03:52:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 03:52:16 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8010400000031) 03:52:16 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfcfdffff, 0x0, 0x0, 0x0) 03:52:16 executing program 0: 03:52:16 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x60000000, 0x0, 0x0, 0x0) 03:52:16 executing program 0: [ 1676.434792] team0 (unregistering): Port device team_slave_0 removed [ 1676.597691] team0 (unregistering): Port device team_slave_1 removed 03:52:17 executing program 2: 03:52:17 executing program 5: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r0, r0, 0x0, 0x8010400000031) 03:52:19 executing program 0: 03:52:19 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6800, 0x0, 0x0, 0x0) 03:52:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 03:52:19 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x8010400000031) 03:52:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 03:52:19 executing program 2: 03:52:19 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x74, 0x0, 0x0, 0x0) 03:52:19 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r0, r0, 0x0, 0x8010400000031) 03:52:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 03:52:19 executing program 2: 03:52:19 executing program 0: 03:52:19 executing program 0: 03:52:19 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2000000, 0x0, 0x0, 0x0) 03:52:19 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) sendfile(r1, r1, 0x0, 0x8010400000031) 03:52:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 03:52:19 executing program 2: 03:52:19 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x34000000, 0x0, 0x0, 0x0) 03:52:19 executing program 0: 03:52:19 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x8010400000031) 03:52:19 executing program 2: 03:52:22 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8010400000031) 03:52:22 executing program 0: chdir(0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) geteuid() getpgid(0x0) getuid() stat(0x0, &(0x7f0000001140)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getgroups(0x2, &(0x7f0000002ec0)=[0xee01, 0xee01]) 03:52:22 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x42440000, 0x0, 0x0, 0x0) 03:52:22 executing program 2: chdir(&(0x7f0000000180)='./file0\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='map_files\x00') getdents(r1, &(0x7f0000000040)=""/46, 0x2e) dup3(0xffffffffffffffff, r1, 0x80000) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_VL_READ(r1, 0x80047013, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) geteuid() stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getpgid(0x0) getgid() getuid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001000)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) stat(0x0, &(0x7f0000001140)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getegid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000002d80)) getgroups(0x4, &(0x7f0000002ec0)=[0x0, 0xee01, 0xee01, 0xee01]) 03:52:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 03:52:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 03:52:22 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x504d, 0x0, 0x0, 0x0) 03:52:22 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x0) 03:52:22 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='auxv\x00') preadv(r0, &(0x7f00000006c0)=[{&(0x7f0000000040)=""/134, 0x86}], 0x1000000000000226, 0x0) 03:52:22 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfffffffd, 0x0, 0x0, 0x0) 03:52:22 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f0000000280)='IPVS\x00', 0x5, 0xffffffffffffffff) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) r3 = creat(&(0x7f0000000580)='./bus\x00', 0x0) io_setup(0x0, 0x0) ioctl$RTC_IRQP_READ(r3, 0x8008700b, &(0x7f0000000640)) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="400000000000000000000000000000000100000000000000050000000000000000000000006ba4c33b0778000000000000000000000000000004000000000000000000000000"], 0x46) io_submit(0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000005c0)) setgid(r4) open(&(0x7f0000000600)='./bus\x00', 0x0, 0x140) inotify_init() close(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000740)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f00000041c0), &(0x7f0000004200)=0x14, 0x800) chroot(&(0x7f00000002c0)='./bus\x00') syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/net\x00') 03:52:22 executing program 0: mkdir(&(0x7f00000018c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x1, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) 03:52:22 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x820e000000000000, 0x0, 0x0, 0x0) 03:52:22 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x0) 03:52:22 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x97ffffff, 0x0, 0x0, 0x0) [ 1682.101108] audit: type=1804 audit(2000001142.661:1408): pid=30736 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir897496843/syzkaller.xtHmBG/551/bus" dev="sda1" ino=16994 res=1 03:52:22 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f0000000280)='IPVS\x00', 0x5, 0xffffffffffffffff) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) io_setup(0x0, 0x0) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, &(0x7f0000000640)) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="400000000000000000000000000000000100000000000000050000000000000000000000006ba4c33b0778000000000000000000000000000004000000000000000000000000"], 0x46) io_submit(0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000005c0)) setgid(r3) open(&(0x7f0000000600)='./bus\x00', 0x0, 0x140) inotify_init() syz_genetlink_get_family_id$team(&(0x7f0000000740)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f00000041c0), &(0x7f0000004200)=0x14, 0x800) chroot(&(0x7f00000002c0)='./bus\x00') syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) 03:52:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 03:52:25 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x0) 03:52:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x101800, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0xf5aea8d628d1b5e2, 0x0) mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(r3, 0x0, 0x20, &(0x7f0000000040)={@rand_addr, @remote}, 0x28f) listen(r0, 0x80) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$P9_RLINK(r1, &(0x7f0000000340)={0x7}, 0x7) ioctl$EVIOCGPROP(r5, 0x80404509, &(0x7f0000000200)=""/241) write(r4, &(0x7f0000000bc0)="ed", 0x1) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = accept4(r0, 0x0, 0x0, 0x80000) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 03:52:25 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x500, 0x0, 0x0, 0x0) 03:52:25 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f0000000280)='IPVS\x00', 0x5, 0xffffffffffffffff) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) io_setup(0x0, 0x0) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, &(0x7f0000000640)) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="400000000000000000000000000000000100000000000000050000000000000000000000006ba4c33b0778000000000000000000000000000004000000000000000000000000"], 0x46) io_submit(0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000005c0)) setgid(r3) open(&(0x7f0000000600)='./bus\x00', 0x0, 0x140) inotify_init() syz_genetlink_get_family_id$team(&(0x7f0000000740)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f00000041c0), &(0x7f0000004200)=0x14, 0x800) chroot(&(0x7f00000002c0)='./bus\x00') syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) 03:52:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 03:52:25 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfffffdfc, 0x0, 0x0, 0x0) 03:52:25 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f0000000280)='IPVS\x00', 0x5, 0xffffffffffffffff) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) io_setup(0x0, 0x0) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, &(0x7f0000000640)) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="400000000000000000000000000000000100000000000000050000000000000000000000006ba4c33b0778000000000000000000000000000004000000000000000000000000"], 0x46) io_submit(0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000005c0)) setgid(r3) open(&(0x7f0000000600)='./bus\x00', 0x0, 0x140) inotify_init() syz_genetlink_get_family_id$team(&(0x7f0000000740)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f00000041c0), &(0x7f0000004200)=0x14, 0x800) chroot(&(0x7f00000002c0)='./bus\x00') syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) 03:52:25 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={"69705f7674693000000100", 0x201e}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001fc0)={'ip_vti0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={@ipv4={[], [], @multicast2}, 0x0, r3}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) sendto(r4, 0x0, 0x0, 0x0, &(0x7f0000000200)=@generic={0xa, "a268d051afbb30b9923e133c4f56259c85a08979aa34c5e1f0eb820d62d5b0cc4faf74f741cba4496bcce0b430f1a59cf4b0969164bfc3019718e2cecf7aea450e50c1f6c3411889c8b9aefdcf069642a4897d1ae6f8749697df253a8bcfae046f8b9741ca762548255274875d3f737894f8e5c23221b0087c41ad03467a"}, 0x80) 03:52:25 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xd010000, 0x0, 0x0, 0x0) 03:52:25 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000006a80)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x198) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000040), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) dup2(r1, r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:52:25 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x3000000, 0x0, 0x0, 0x0) 03:52:28 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCGETS(r1, 0x5401, &(0x7f00000000c0)) 03:52:28 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x22, 0x0, 0x0, 0x0) 03:52:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 03:52:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 03:52:28 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r1, 0x8200) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x8000fffffffe) syncfs(0xffffffffffffffff) 03:52:28 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)="2e2f6367726f7570000c239fd085acc49b812db3d73d43ea", 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) [ 1687.920130] audit: type=1804 audit(2000001148.483:1409): pid=30806 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir897496843/syzkaller.xtHmBG/553/bus" dev="sda1" ino=16947 res=1 03:52:28 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x0, 0x0) [ 1687.952220] audit: type=1804 audit(2000001148.483:1410): pid=30812 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir897496843/syzkaller.xtHmBG/553/bus" dev="sda1" ino=16947 res=1 03:52:28 executing program 1: 03:52:28 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000040)={'lo\x00'}) 03:52:28 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2c000000, 0x0, 0x0, 0x0) 03:52:28 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x800000, 0x0) chdir(&(0x7f0000000200)='./file0\x00') r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000c80)={0x8, "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", 0x1000}, 0x1006) sendmsg$unix(r0, 0x0, 0x90) sendfile(r0, r0, &(0x7f0000d83ff8), 0x2008000fffffffe) chdir(&(0x7f0000000000)='./file0\x00') bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x5, 0x4) getresuid(&(0x7f0000000140)=0x0, &(0x7f0000000240), 0x0) write$P9_RSTATu(r0, &(0x7f0000000380)={0x69, 0x7d, 0x2, {{0x0, 0x54, 0x7b75, 0x401, {0x40, 0x0, 0x5}, 0x100000, 0x9, 0x1ff, 0xf, 0x10, '/selinux/policy\x00', 0x7, 'selinux', 0x4, '/em1', 0x6, 'ramfs\x00'}, 0x0, "", r1}}, 0x69) openat$zero(0xffffffffffffff9c, 0x0, 0x2000, 0x0) getpgid(0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) [ 1688.064229] audit: type=1804 audit(2000001148.483:1411): pid=30806 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir897496843/syzkaller.xtHmBG/553/bus" dev="sda1" ino=16947 res=1 03:52:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000080)={0x0, @rand_addr, 0x0, 0x0, 'wrr\x00'}, 0x2c) [ 1688.653906] syz-executor0 invoked oom-killer: gfp_mask=0x6200c2(GFP_HIGHUSER), nodemask=(null), order=0, oom_score_adj=0 [ 1688.665767] syz-executor0 cpuset=syz0 mems_allowed=0 [ 1688.671481] CPU: 1 PID: 30825 Comm: syz-executor0 Not tainted 4.20.0-rc6+ #151 [ 1688.678843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1688.688183] Call Trace: [ 1688.690781] dump_stack+0x244/0x39d [ 1688.694415] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1688.699596] ? mark_held_locks+0x130/0x130 [ 1688.703831] ? mark_held_locks+0x130/0x130 [ 1688.708064] dump_header+0x27b/0xf72 [ 1688.711784] ? pagefault_out_of_memory+0x197/0x197 [ 1688.716701] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1688.722228] ? check_preemption_disabled+0x48/0x280 [ 1688.727233] ? zap_class+0x640/0x640 [ 1688.730931] ? __lock_is_held+0xb5/0x140 [ 1688.735016] ? zap_class+0x640/0x640 [ 1688.738728] ? print_usage_bug+0xc0/0xc0 [ 1688.742776] ? find_held_lock+0x36/0x1c0 [ 1688.746826] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 03:52:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="0012000000") r1 = openat$cgroup_ro(r0, &(0x7f0000000200)="6d656d0001792e737761532e63757272656e7400", 0x0, 0x0) pread64(r1, &(0x7f0000000240)=""/136, 0x200002c8, 0x930002) 03:52:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000040)={'lo\x00'}) 03:52:29 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6000, 0x0, 0x0, 0x0) 03:52:29 executing program 1: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xfffffef6) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='./file1\x00') lseek(r0, 0x0, 0x1) 03:52:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) [ 1688.752350] ? find_held_lock+0x36/0x1c0 [ 1688.756421] ? mark_held_locks+0xc7/0x130 [ 1688.760583] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1688.765694] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1688.770804] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1688.775397] ? trace_hardirqs_on+0xbd/0x310 [ 1688.779731] ? kasan_check_read+0x11/0x20 [ 1688.783886] ? ___ratelimit+0x3b4/0x672 [ 1688.787871] ? trace_hardirqs_off_caller+0x310/0x310 [ 1688.792986] ? trace_hardirqs_on+0x310/0x310 [ 1688.797415] ? lock_downgrade+0x900/0x900 03:52:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="0012000000") r1 = openat$cgroup_ro(r0, &(0x7f0000000200)="6d656d0001792e737761532e63757272656e7400", 0x0, 0x0) pread64(r1, &(0x7f0000000240)=""/136, 0x200002c8, 0x930002) [ 1688.801583] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1688.806704] ? ___ratelimit+0x3b9/0x672 [ 1688.810693] ? idr_get_free+0xf70/0xf70 [ 1688.814676] ? _raw_spin_unlock_irq+0x27/0x80 [ 1688.819178] ? _raw_spin_unlock_irq+0x27/0x80 [ 1688.823689] oom_kill_process.cold.27+0x10/0x903 [ 1688.828451] ? _raw_spin_unlock_irq+0x27/0x80 [ 1688.832951] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1688.837552] ? oom_evaluate_task+0x540/0x540 [ 1688.841972] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1688.847525] ? cgroup_procs_next+0x70/0x70 03:52:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="0012000000") r1 = openat$cgroup_ro(r0, &(0x7f0000000200)="6d656d0001792e737761532e63757272656e7400", 0x0, 0x0) pread64(r1, &(0x7f0000000240)=""/136, 0x200002c8, 0x930002) [ 1688.851773] ? _raw_spin_unlock_irq+0x60/0x80 [ 1688.856300] ? oom_badness+0xaa0/0xaa0 [ 1688.860214] ? mem_cgroup_scan_tasks+0x1c3/0x1e0 [ 1688.864979] ? mem_cgroup_iter_break+0x30/0x30 [ 1688.869589] ? mark_held_locks+0xc7/0x130 [ 1688.873754] out_of_memory+0xa84/0x1430 [ 1688.877747] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1688.882338] ? kasan_check_read+0x11/0x20 [ 1688.886514] ? oom_killer_disable+0x3a0/0x3a0 [ 1688.891041] mem_cgroup_out_of_memory+0x15e/0x210 [ 1688.895899] ? memory_oom_group_write+0x160/0x160 [ 1688.900750] ? mem_cgroup_try_charge+0x627/0xe20 03:52:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="0012000000") r1 = openat$cgroup_ro(r0, &(0x7f0000000200)="6d656d0001792e737761532e63757272656e7400", 0x0, 0x0) pread64(r1, &(0x7f0000000240)=""/136, 0x200002c8, 0x930002) [ 1688.905522] ? page_counter_try_charge+0x1c1/0x220 [ 1688.910464] try_charge+0xda9/0x1700 [ 1688.914188] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1688.919131] ? kasan_check_read+0x11/0x20 [ 1688.923302] ? mem_cgroup_from_task+0x1f0/0x1f0 [ 1688.927986] ? get_mem_cgroup_from_mm.part.62+0x221/0x880 [ 1688.933538] ? lock_page_memcg+0x350/0x350 [ 1688.937802] ? check_preemption_disabled+0x48/0x280 [ 1688.942836] ? lock_acquire+0x1ed/0x520 [ 1688.946825] ? mem_cgroup_oom_control_write+0x100/0x100 03:52:29 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)="0012000000") pread64(0xffffffffffffffff, &(0x7f0000000240)=""/136, 0x200002c8, 0x930002) [ 1688.952205] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1688.957755] ? check_preemption_disabled+0x48/0x280 [ 1688.962783] ? kasan_check_read+0x11/0x20 [ 1688.966961] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1688.972246] ? rcu_softirq_qs+0x20/0x20 [ 1688.976235] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1688.980833] ? trace_hardirqs_on+0xbd/0x310 [ 1688.985171] mem_cgroup_try_charge+0x627/0xe20 [ 1688.989763] ? __lock_acquire+0x62f/0x4c20 [ 1688.994022] ? mem_cgroup_protected+0xa60/0xa60 [ 1688.998713] ? __lock_acquire+0x62f/0x4c20 03:52:29 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="6d656d0001792e737761532e63757272656e7400", 0x0, 0x0) pread64(r0, &(0x7f0000000240)=""/136, 0x200002c8, 0x930002) [ 1689.002961] ? mark_held_locks+0x130/0x130 [ 1689.007206] ? find_held_lock+0x36/0x1c0 [ 1689.011298] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1689.016846] ? PageHuge+0x183/0x2b0 [ 1689.020483] ? vma_kernel_pagesize+0xb0/0xb0 [ 1689.024891] ? mark_held_locks+0x130/0x130 [ 1689.029129] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1689.034070] ? kasan_check_read+0x11/0x20 [ 1689.038228] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1689.043587] __add_to_page_cache_locked+0x793/0x1840 [ 1689.048797] ? zap_class+0x640/0x640 [ 1689.052535] ? find_lock_entry+0x8e0/0x8e0 [ 1689.056778] ? zap_class+0x640/0x640 [ 1689.060506] ? check_preemption_disabled+0x48/0x280 [ 1689.065538] ? count_shadow_nodes+0x670/0x670 [ 1689.070044] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1689.075156] ? zap_class+0x640/0x640 [ 1689.078876] ? find_held_lock+0x36/0x1c0 [ 1689.083385] ? zap_class+0x640/0x640 [ 1689.087110] ? find_get_entry+0xa87/0x1120 [ 1689.091364] ? zap_class+0x640/0x640 [ 1689.095089] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1689.100637] ? check_preemption_disabled+0x48/0x280 [ 1689.105672] ? __lock_is_held+0xb5/0x140 [ 1689.109753] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1689.114795] ? __alloc_pages_nodemask+0xb87/0xea0 [ 1689.119655] add_to_page_cache_lru+0x355/0xdb0 [ 1689.124256] ? add_to_page_cache_locked+0x40/0x40 [ 1689.129116] ? page_mapping+0x5a2/0xa50 [ 1689.133111] ? __page_mapcount+0x580/0x580 [ 1689.137373] ? __set_page_dirty_no_writeback+0x3c9/0x6c0 [ 1689.142838] ? do_writepages+0x1a0/0x1a0 [ 1689.146910] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1689.151859] ? __lock_is_held+0xb5/0x140 [ 1689.155952] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1689.161509] ? alloc_pages_current+0x17b/0x350 [ 1689.166107] ? __page_cache_alloc+0x191/0x5c0 [ 1689.170616] ? do_writepages+0x1a0/0x1a0 [ 1689.174694] ? generic_perform_write+0x6a0/0x6a0 [ 1689.179459] ? __writepage+0xe0/0xe0 [ 1689.183186] ? __might_sleep+0x95/0x190 [ 1689.187174] pagecache_get_page+0x53a/0xf00 [ 1689.191604] ? add_to_page_cache_lru+0xdb0/0xdb0 [ 1689.196378] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1689.201935] ? balance_dirty_pages_ratelimited+0x1f7/0x2370 [ 1689.207658] ? __lock_acquire+0x62f/0x4c20 [ 1689.211905] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1689.217454] ? generic_file_read_iter+0x9ad/0x2d70 [ 1689.222402] ? balance_dirty_pages+0x3800/0x3800 [ 1689.227168] ? zap_class+0x640/0x640 [ 1689.230898] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1689.236450] ? unlock_page+0x2c2/0x4c0 [ 1689.240454] ? wake_up_page_bit+0x6f0/0x6f0 [ 1689.244798] ? find_held_lock+0x36/0x1c0 [ 1689.248874] ? zap_class+0x640/0x640 [ 1689.252596] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1689.258147] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1689.263775] ? simple_write_end+0x3bb/0x820 [ 1689.268117] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1689.273674] grab_cache_page_write_begin+0x6f/0xa0 [ 1689.278615] simple_write_begin+0x9d/0x3a0 [ 1689.282864] ? empty_dir_readdir+0x360/0x360 [ 1689.287386] ? _copy_to_iter_mcsafe+0x1680/0x1680 [ 1689.292259] generic_perform_write+0x3aa/0x6a0 [ 1689.296864] ? add_page_wait_queue+0x400/0x400 [ 1689.301454] ? current_time+0x1b0/0x1b0 [ 1689.305459] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1689.310493] ? generic_write_check_limits+0x28d/0x370 [ 1689.315700] __generic_file_write_iter+0x26e/0x630 [ 1689.320635] ? iter_file_splice_write+0x260/0x1050 [ 1689.325581] generic_file_write_iter+0x34d/0x6b0 [ 1689.330351] ? __generic_file_write_iter+0x630/0x630 [ 1689.335463] ? __might_sleep+0x95/0x190 [ 1689.339451] do_iter_readv_writev+0x8b0/0xa80 [ 1689.343960] ? vfs_dedupe_file_range+0x700/0x700 [ 1689.348826] ? rw_verify_area+0x118/0x360 [ 1689.352988] do_iter_write+0x185/0x5f0 [ 1689.356984] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1689.362542] vfs_iter_write+0x77/0xb0 [ 1689.366354] iter_file_splice_write+0x90d/0x1050 [ 1689.371138] ? page_cache_pipe_buf_release+0x310/0x310 [ 1689.376434] ? selinux_file_permission+0x90/0x540 [ 1689.381310] ? rw_verify_area+0x118/0x360 [ 1689.385549] ? page_cache_pipe_buf_release+0x310/0x310 [ 1689.390829] direct_splice_actor+0x128/0x190 [ 1689.395303] splice_direct_to_actor+0x3ad/0x9d0 [ 1689.399981] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1689.405525] ? pipe_to_sendpage+0x400/0x400 [ 1689.405549] ? do_splice_to+0x190/0x190 [ 1689.405571] ? security_file_permission+0x1c2/0x220 [ 1689.405589] ? rw_verify_area+0x118/0x360 [ 1689.405608] do_splice_direct+0x2d4/0x420 [ 1689.405625] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1689.405646] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1689.413912] ? __sb_start_write+0x1b2/0x370 [ 1689.413934] do_sendfile+0x62a/0xe20 [ 1689.413963] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1689.413992] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1689.414006] ? _copy_from_user+0xdf/0x150 [ 1689.414024] __x64_sys_sendfile64+0x15d/0x250 [ 1689.414040] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1689.414065] do_syscall_64+0x1b9/0x820 [ 1689.414081] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1689.414099] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1689.414114] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1689.414130] ? trace_hardirqs_on_caller+0x310/0x310 [ 1689.414147] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1689.414166] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1689.414189] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1689.414212] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1689.414224] RIP: 0033:0x457679 [ 1689.414250] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1689.414259] RSP: 002b:00007fcedcfa1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1689.414274] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457679 [ 1689.414283] RDX: 0000000020d83ff8 RSI: 0000000000000003 RDI: 0000000000000003 [ 1689.414292] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1689.414302] R10: 02008000fffffffe R11: 0000000000000246 R12: 00007fcedcfa26d4 [ 1689.414312] R13: 00000000004c3e2b R14: 00000000004d6c40 R15: 00000000ffffffff [ 1689.425881] Task in /syz0 killed as a result of limit of /syz0 [ 1689.610578] memory: usage 307200kB, limit 307200kB, failcnt 458 [ 1689.616817] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1689.630992] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1689.637267] Memory cgroup stats for /syz0: cache:35564KB rss:243232KB rss_huge:229376KB shmem:72KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16152KB active_anon:225016KB inactive_file:0KB active_file:0KB unevictable:37580KB [ 1689.660035] Memory cgroup out of memory: Kill process 9552 (syz-executor0) score 166 or sacrifice child [ 1689.673009] Killed process 9552 (syz-executor0) total-vm:70472kB, anon-rss:18192kB, file-rss:32896kB, shmem-rss:0kB [ 1689.694199] oom_reaper: reaped process 9552 (syz-executor0), now anon-rss:0kB, file-rss:32768kB, shmem-rss:0kB 03:52:30 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x800000, 0x0) chdir(&(0x7f0000000200)='./file0\x00') r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000c80)={0x8, "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", 0x1000}, 0x1006) sendmsg$unix(r0, 0x0, 0x90) sendfile(r0, r0, &(0x7f0000d83ff8), 0x2008000fffffffe) chdir(&(0x7f0000000000)='./file0\x00') bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x5, 0x4) getresuid(&(0x7f0000000140)=0x0, &(0x7f0000000240), 0x0) write$P9_RSTATu(r0, &(0x7f0000000380)={0x69, 0x7d, 0x2, {{0x0, 0x54, 0x7b75, 0x401, {0x40, 0x0, 0x5}, 0x100000, 0x9, 0x1ff, 0xf, 0x10, '/selinux/policy\x00', 0x7, 'selinux', 0x4, '/em1', 0x6, 'ramfs\x00'}, 0x0, "", r1}}, 0x69) openat$zero(0xffffffffffffff9c, 0x0, 0x2000, 0x0) getpgid(0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) 03:52:30 executing program 5: r0 = syz_open_procfs(0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000200)="6d656d0001792e737761532e63757272656e7400", 0x0, 0x0) pread64(r1, &(0x7f0000000240)=""/136, 0x200002c8, 0x930002) 03:52:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000040)={'lo\x00'}) 03:52:30 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xa, 0x0, 0x0, 0x0) 03:52:30 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)="0012000000") r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="6d656d0001792e737761532e63757272656e7400", 0x0, 0x0) pread64(r0, &(0x7f0000000240)=""/136, 0x200002c8, 0x930002) 03:52:30 executing program 1: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000dbd000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 03:52:30 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x10d, 0x0, 0x0, 0x0) 03:52:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000040)={'lo\x00'}) 03:52:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 03:52:30 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="0012000000") r1 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) pread64(r1, &(0x7f0000000240)=""/136, 0x200002c8, 0x930002) 03:52:30 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x8000a0ffffffff, 0x0, 0x0, 0x0) 03:52:30 executing program 2: ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000040)={'lo\x00'}) 03:52:31 executing program 0: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) 03:52:31 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f00000000c0), 0x0, 0x0, 0x8) write(r1, &(0x7f0000000040), 0x1d8a7fe0) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) 03:52:31 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="0012000000") openat$cgroup_ro(r0, &(0x7f0000000200)="6d656d0001792e737761532e63757272656e7400", 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/136, 0x200002c8, 0x930002) 03:52:31 executing program 2: ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000040)={'lo\x00'}) 03:52:31 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x0, 0x0) 03:52:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 03:52:31 executing program 2: ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000040)={'lo\x00'}) 03:52:31 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x0, 0x0) 03:52:31 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="0012000000") r1 = openat$cgroup_ro(r0, &(0x7f0000000200)="6d656d0001792e737761532e63757272656e7400", 0x0, 0x0) pread64(r1, 0x0, 0x0, 0x930002) 03:52:31 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xe, 0x0, 0x0, 0x0) 03:52:31 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000040)={'lo\x00'}) 03:52:31 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="0012000000") r1 = openat$cgroup_ro(r0, &(0x7f0000000200)="6d656d0001792e737761532e63757272656e7400", 0x0, 0x0) pread64(r1, 0x0, 0x0, 0x0) [ 1691.317741] syz-executor1 invoked oom-killer: gfp_mask=0x7200c2(GFP_HIGHUSER|__GFP_ACCOUNT), nodemask=(null), order=0, oom_score_adj=0 [ 1691.346248] syz-executor1 cpuset=syz1 mems_allowed=0 [ 1691.353659] CPU: 0 PID: 30909 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #151 [ 1691.361037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1691.370395] Call Trace: [ 1691.372994] dump_stack+0x244/0x39d [ 1691.376639] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1691.381853] dump_header+0x27b/0xf72 [ 1691.385587] ? mark_held_locks+0x130/0x130 [ 1691.389833] ? pagefault_out_of_memory+0x197/0x197 [ 1691.394772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1691.400320] ? check_preemption_disabled+0x48/0x280 [ 1691.405356] ? zap_class+0x640/0x640 [ 1691.409088] ? __lock_is_held+0xb5/0x140 [ 1691.413182] ? zap_class+0x640/0x640 [ 1691.416908] ? print_usage_bug+0xc0/0xc0 [ 1691.421065] ? find_held_lock+0x36/0x1c0 [ 1691.425245] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1691.430805] ? find_held_lock+0x36/0x1c0 [ 1691.434880] ? mark_held_locks+0xc7/0x130 [ 1691.439050] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1691.444164] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1691.449260] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1691.453853] ? trace_hardirqs_on+0xbd/0x310 [ 1691.458172] ? kasan_check_read+0x11/0x20 [ 1691.462308] ? ___ratelimit+0x3b4/0x672 [ 1691.466287] ? trace_hardirqs_off_caller+0x310/0x310 [ 1691.471382] ? trace_hardirqs_on+0x310/0x310 [ 1691.475789] ? lock_downgrade+0x900/0x900 [ 1691.480286] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1691.485463] ? ___ratelimit+0x3b9/0x672 [ 1691.489510] ? idr_get_free+0xf70/0xf70 [ 1691.493470] ? _raw_spin_unlock_irq+0x27/0x80 [ 1691.497966] ? _raw_spin_unlock_irq+0x27/0x80 [ 1691.502541] oom_kill_process.cold.27+0x10/0x903 [ 1691.507287] ? _raw_spin_unlock_irq+0x27/0x80 [ 1691.511848] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1691.516433] ? oom_evaluate_task+0x540/0x540 [ 1691.520834] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1691.526359] ? cgroup_procs_next+0x70/0x70 [ 1691.530583] ? _raw_spin_unlock_irq+0x60/0x80 [ 1691.535098] ? oom_badness+0xaa0/0xaa0 [ 1691.538975] ? mem_cgroup_scan_tasks+0x1c3/0x1e0 [ 1691.543719] ? mem_cgroup_iter_break+0x30/0x30 [ 1691.548294] ? mark_held_locks+0xc7/0x130 [ 1691.552430] out_of_memory+0xa84/0x1430 [ 1691.556392] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1691.560965] ? kasan_check_read+0x11/0x20 [ 1691.565114] ? oom_killer_disable+0x3a0/0x3a0 [ 1691.569616] mem_cgroup_out_of_memory+0x15e/0x210 [ 1691.574446] ? memory_oom_group_write+0x160/0x160 [ 1691.579272] ? memcg_kmem_charge_memcg+0x7c/0x120 [ 1691.584131] ? page_counter_try_charge+0x1c1/0x220 [ 1691.589077] try_charge+0xda9/0x1700 [ 1691.592790] ? mem_cgroup_from_task+0x1f0/0x1f0 [ 1691.597466] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1691.602385] ? kasan_check_read+0x11/0x20 [ 1691.606521] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1691.611784] ? rcu_softirq_qs+0x20/0x20 [ 1691.615769] ? get_mem_cgroup_from_mm.part.62+0x221/0x880 [ 1691.621397] ? percpu_ref_put_many+0x11c/0x260 [ 1691.625982] ? lock_page_memcg+0x350/0x350 [ 1691.630211] ? lock_acquire+0x1ed/0x520 [ 1691.634180] ? mem_cgroup_oom_control_write+0x100/0x100 [ 1691.639556] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1691.645112] ? check_preemption_disabled+0x48/0x280 [ 1691.650131] memcg_kmem_charge_memcg+0x7c/0x120 [ 1691.654786] ? memcg_kmem_put_cache+0xb0/0xb0 [ 1691.659269] ? __lock_is_held+0xb5/0x140 [ 1691.663321] memcg_kmem_charge+0x149/0x350 [ 1691.667560] __alloc_pages_nodemask+0x75e/0xea0 [ 1691.672229] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 1691.677237] ? perf_trace_sched_process_exec+0x860/0x860 [ 1691.682679] ? kasan_check_write+0x14/0x20 [ 1691.686901] ? copyin+0xb7/0x100 [ 1691.690274] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1691.695277] ? copy_page_from_iter+0x541/0x8f0 [ 1691.699964] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1691.705491] alloc_pages_current+0x173/0x350 [ 1691.709891] pipe_write+0x910/0xec0 [ 1691.713509] __vfs_write+0x6b8/0x9f0 [ 1691.717227] ? kernel_read+0x120/0x120 [ 1691.721125] ? __might_sleep+0x95/0x190 [ 1691.725116] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1691.730671] ? selinux_file_permission+0x90/0x540 [ 1691.735636] ? rw_verify_area+0x118/0x360 [ 1691.739776] vfs_write+0x1fc/0x560 [ 1691.743314] ksys_write+0x101/0x260 [ 1691.746933] ? __ia32_sys_read+0xb0/0xb0 [ 1691.751019] ? trace_hardirqs_off_caller+0x310/0x310 [ 1691.756143] __x64_sys_write+0x73/0xb0 [ 1691.760035] do_syscall_64+0x1b9/0x820 [ 1691.763940] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1691.769290] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1691.774225] ? trace_hardirqs_on_caller+0x310/0x310 [ 1691.779235] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1691.784239] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1691.790890] ? __switch_to_asm+0x40/0x70 [ 1691.794943] ? __switch_to_asm+0x34/0x70 [ 1691.799002] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1691.803852] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1691.809589] RIP: 0033:0x457679 [ 1691.812774] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1691.831683] RSP: 002b:00007f098c878c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1691.839376] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457679 [ 1691.846628] RDX: 000000001d8a7fe0 RSI: 0000000020000040 RDI: 0000000000000004 [ 1691.853886] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1691.861154] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f098c8796d4 [ 1691.868407] R13: 00000000004c2db5 R14: 00000000004da348 R15: 00000000ffffffff [ 1691.889557] Task in /syz1 killed as a result of limit of /syz1 [ 1691.895618] memory: usage 307200kB, limit 307200kB, failcnt 1186 [ 1691.902665] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1691.909674] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 03:52:32 executing program 0: r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) [ 1691.916222] Memory cgroup stats for /syz1: cache:108KB rss:275328KB rss_huge:260096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:12KB active_anon:275532KB inactive_file:0KB active_file:12KB unevictable:0KB [ 1691.939826] Memory cgroup out of memory: Kill process 24018 (syz-executor1) score 1106 or sacrifice child [ 1691.952505] Killed process 24018 (syz-executor1) total-vm:70472kB, anon-rss:2208kB, file-rss:33672kB, shmem-rss:0kB [ 1691.970715] oom_reaper: reaped process 24018 (syz-executor1), now anon-rss:0kB, file-rss:32840kB, shmem-rss:0kB [ 1691.999364] syz-executor1 invoked oom-killer: gfp_mask=0x7200c2(GFP_HIGHUSER|__GFP_ACCOUNT), nodemask=(null), order=0, oom_score_adj=0 [ 1692.012217] syz-executor1 cpuset=syz1 mems_allowed=0 [ 1692.018211] CPU: 0 PID: 30909 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #151 [ 1692.025576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1692.034913] Call Trace: [ 1692.037495] dump_stack+0x244/0x39d [ 1692.041119] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1692.046321] dump_header+0x27b/0xf72 [ 1692.050033] ? mark_held_locks+0x130/0x130 [ 1692.054259] ? pagefault_out_of_memory+0x197/0x197 [ 1692.059180] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1692.064706] ? check_preemption_disabled+0x48/0x280 [ 1692.069712] ? zap_class+0x640/0x640 [ 1692.073413] ? __lock_is_held+0xb5/0x140 [ 1692.077468] ? zap_class+0x640/0x640 [ 1692.081173] ? print_usage_bug+0xc0/0xc0 [ 1692.085247] ? find_held_lock+0x36/0x1c0 [ 1692.089297] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1692.094824] ? find_held_lock+0x36/0x1c0 [ 1692.098876] ? mark_held_locks+0xc7/0x130 [ 1692.103014] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1692.108110] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1692.113200] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1692.117774] ? trace_hardirqs_on+0xbd/0x310 [ 1692.122084] ? kasan_check_read+0x11/0x20 [ 1692.126219] ? ___ratelimit+0x3b4/0x672 [ 1692.130181] ? trace_hardirqs_off_caller+0x310/0x310 [ 1692.135272] ? trace_hardirqs_on+0x310/0x310 [ 1692.139672] ? lock_downgrade+0x900/0x900 [ 1692.143810] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1692.148914] ? ___ratelimit+0x3b9/0x672 [ 1692.152885] ? idr_get_free+0xf70/0xf70 [ 1692.156857] ? _raw_spin_unlock_irq+0x27/0x80 [ 1692.161337] ? _raw_spin_unlock_irq+0x27/0x80 [ 1692.165823] oom_kill_process.cold.27+0x10/0x903 [ 1692.170565] ? _raw_spin_unlock_irq+0x27/0x80 [ 1692.175052] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1692.179629] ? oom_evaluate_task+0x540/0x540 [ 1692.184030] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1692.189566] ? cgroup_procs_next+0x70/0x70 [ 1692.193797] ? _raw_spin_unlock_irq+0x60/0x80 [ 1692.198281] ? oom_badness+0xaa0/0xaa0 [ 1692.202159] ? mem_cgroup_scan_tasks+0x1c3/0x1e0 [ 1692.206905] ? mem_cgroup_iter_break+0x30/0x30 [ 1692.211504] ? mark_held_locks+0xc7/0x130 [ 1692.215657] out_of_memory+0xa84/0x1430 [ 1692.219618] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1692.224188] ? kasan_check_read+0x11/0x20 [ 1692.228351] ? oom_killer_disable+0x3a0/0x3a0 [ 1692.232854] mem_cgroup_out_of_memory+0x15e/0x210 [ 1692.237688] ? memory_oom_group_write+0x160/0x160 [ 1692.242516] ? memcg_kmem_charge_memcg+0x7c/0x120 [ 1692.247353] ? page_counter_try_charge+0x1c1/0x220 [ 1692.252273] try_charge+0xda9/0x1700 [ 1692.255985] ? mem_cgroup_from_task+0x1f0/0x1f0 [ 1692.260651] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1692.265579] ? kasan_check_read+0x11/0x20 [ 1692.269718] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1692.274981] ? rcu_softirq_qs+0x20/0x20 [ 1692.278957] ? get_mem_cgroup_from_mm.part.62+0x221/0x880 [ 1692.284483] ? percpu_ref_put_many+0x11c/0x260 [ 1692.289058] ? lock_page_memcg+0x350/0x350 [ 1692.293287] ? lock_acquire+0x1ed/0x520 [ 1692.297262] ? mem_cgroup_oom_control_write+0x100/0x100 [ 1692.302616] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1692.308146] ? check_preemption_disabled+0x48/0x280 [ 1692.313155] memcg_kmem_charge_memcg+0x7c/0x120 [ 1692.317812] ? memcg_kmem_put_cache+0xb0/0xb0 [ 1692.322306] ? __lock_is_held+0xb5/0x140 [ 1692.326362] memcg_kmem_charge+0x149/0x350 [ 1692.330592] __alloc_pages_nodemask+0x75e/0xea0 [ 1692.335267] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 1692.340277] ? perf_trace_sched_process_exec+0x860/0x860 [ 1692.345725] ? kasan_check_write+0x14/0x20 [ 1692.349949] ? copyin+0xb7/0x100 [ 1692.353308] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1692.358399] ? copy_page_from_iter+0x541/0x8f0 [ 1692.362978] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1692.368521] alloc_pages_current+0x173/0x350 [ 1692.372925] pipe_write+0x910/0xec0 [ 1692.376552] __vfs_write+0x6b8/0x9f0 [ 1692.380260] ? kernel_read+0x120/0x120 [ 1692.384136] ? __might_sleep+0x95/0x190 [ 1692.388114] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1692.393645] ? selinux_file_permission+0x90/0x540 [ 1692.398486] ? rw_verify_area+0x118/0x360 [ 1692.402625] vfs_write+0x1fc/0x560 [ 1692.406160] ksys_write+0x101/0x260 [ 1692.409790] ? __ia32_sys_read+0xb0/0xb0 [ 1692.413848] ? trace_hardirqs_off_caller+0x310/0x310 [ 1692.418943] __x64_sys_write+0x73/0xb0 [ 1692.422823] do_syscall_64+0x1b9/0x820 [ 1692.426700] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1692.432056] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1692.436977] ? trace_hardirqs_on_caller+0x310/0x310 [ 1692.441987] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1692.447023] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1692.453679] ? __switch_to_asm+0x40/0x70 [ 1692.457726] ? __switch_to_asm+0x34/0x70 [ 1692.461782] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1692.466616] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1692.471792] RIP: 0033:0x457679 [ 1692.474973] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1692.493866] RSP: 002b:00007f098c878c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1692.501564] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457679 [ 1692.508939] RDX: 000000001d8a7fe0 RSI: 0000000020000040 RDI: 0000000000000004 [ 1692.516542] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1692.523798] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f098c8796d4 [ 1692.531053] R13: 00000000004c2db5 R14: 00000000004da348 R15: 00000000ffffffff [ 1692.542221] Task in /syz1 killed as a result of limit of /syz1 [ 1692.548236] memory: usage 307092kB, limit 307200kB, failcnt 1246 [ 1692.555348] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1692.562448] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1692.569854] Memory cgroup stats for /syz1: cache:108KB rss:275416KB rss_huge:258048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:12KB active_anon:275500KB inactive_file:4KB active_file:8KB unevictable:0KB [ 1692.591685] Memory cgroup out of memory: Kill process 24082 (syz-executor1) score 1106 or sacrifice child [ 1692.601594] Killed process 24082 (syz-executor1) total-vm:70340kB, anon-rss:2200kB, file-rss:33648kB, shmem-rss:0kB 03:52:33 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) r1 = getpid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000000c0)=r1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fc, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000)="1a8c44203bb0f1b182da383dd71795f51053261e63b0b9f1283f0800000000000000210600000000000000a5dba53c46b82862a2f804121cda7e6b6d878f10be8036e98a270c42d6458f97b342303464e94ccbaf05408837796bb1b807635f2f136d6f4fff945e3f3fa35492e706f3ba32b6a4d04c4999f610647ca59b0c37f96644", 0x82, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000200)=""/226, 0xe2}], 0x1) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 03:52:33 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6, 0x0, 0x0, 0x0) 03:52:33 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000040)={'lo\x00'}) 03:52:33 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(r1, &(0x7f0000000000), 0x49249249249289d, 0x4000044) 03:52:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 03:52:33 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x3bac51733b10d952) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x50, r0, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffcc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) accept4(r1, &(0x7f00000001c0)=@nl, &(0x7f0000000040)=0x80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000400)=""/4096, 0xf769}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) 03:52:33 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6b6b6b00, 0x0, 0x0, 0x0) 03:52:33 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000040)={'lo\x00'}) [ 1692.709215] audit: type=1400 audit(2000001153.276:1412): avc: denied { map } for pid=30935 comm="syz-executor0" path="socket:[183650]" dev="sockfs" ino=183650 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=tcp_socket permissive=1 03:52:33 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfdffffff00000000, 0x0, 0x0, 0x0) 03:52:33 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f00000000c0)) 03:52:33 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x0, 0x0) 03:52:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, 0x0) 03:52:33 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) r1 = getpid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000000c0)=r1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fc, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000)="1a8c44203bb0f1b182da383dd71795f51053261e63b0b9f1283f0800000000000000210600000000000000a5dba53c46b82862a2f804121cda7e6b6d878f10be8036e98a270c42d6458f97b342303464e94ccbaf05408837796bb1b807635f2f136d6f4fff945e3f3fa35492e706f3ba32b6a4d04c4999f610647ca59b0c37f96644", 0x82, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000200)=""/226, 0xe2}], 0x1) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 03:52:33 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@empty, 0x0, 0x1}, 0x20) 03:52:33 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfdffffff, 0x0, 0x0, 0x0) 03:52:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, 0x0) 03:52:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 03:52:33 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='sysfs\x00', 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) 03:52:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, 0x0) 03:52:33 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x9000000, 0x0, 0x0, 0x0) 03:52:33 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xe, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d03010000000000950000000000000071260000000000006706000002000000bf25000000000000620500000e0000007365000000000000bf540000000000000704000004faff003d4301000000000095000000000000005d54090000000000bf250000000000000f040000000000d0b3666b4a53ab91a200070500000e000000bf5400000000000007040000040000003d4301000000000095000000000000006154000000000000bf25000000000000070500000e0000001f6500000000000007050000040000000f6500000000"], 0x0}, 0x48) nanosleep(&(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) 03:52:33 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2c00, 0x0, 0x0, 0x0) 03:52:33 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x13}) 03:52:33 executing program 1: 03:52:34 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000040)="24000000010607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 03:52:34 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, 0x0, 0x0, 0x0) 03:52:34 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='sysfs\x00', 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) 03:52:34 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="5500000018007f1dfd0000b2a4a280930a06000000a8430991000600ff031900a30700000000000000dc1338d5b3b7fcd6f6376acdaa7227c43ab8220000060cec4fab91d4fe6e0000000000000000000000000000", 0x55}], 0x1}, 0x0) [ 1693.474685] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 1693.479135] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 1693.568440] netlink: 57 bytes leftover after parsing attributes in process `syz-executor1'. 03:52:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 03:52:34 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4c, 0x0, 0x0, 0x0) 03:52:34 executing program 2: socketpair$unix(0x1, 0x1000000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 03:52:34 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='sysfs\x00', 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) 03:52:34 executing program 5: 03:52:34 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="5500000018007f1dfd0000b2a4a280930a06000000a8430991000600ff031900a30700000000000000dc1338d5b3b7fcd6f6376acdaa7227c43ab8220000060cec4fab91d4fe6e0000000000000000000000000000", 0x55}], 0x1}, 0x0) 03:52:34 executing program 2: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000015c0)={@mcast2, @dev, @remote, 0x0, 0x0, 0x0, 0x500}) 03:52:34 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xa0008000, 0x0, 0x0, 0x0) 03:52:34 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='sysfs\x00', 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) 03:52:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 03:52:34 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x20000, 0x0, 0x0, 0x0) 03:52:34 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) 03:52:34 executing program 2: 03:52:34 executing program 5: [ 1694.265740] netlink: 57 bytes leftover after parsing attributes in process `syz-executor1'. 03:52:34 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xa000000, 0x0, 0x0, 0x0) 03:52:34 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="5500000018007f1dfd0000b2a4a280930a06000000a8430991000600ff031900a30700000000000000dc1338d5b3b7fcd6f6376acdaa7227c43ab8220000060cec4fab91d4fe6e0000000000000000000000000000", 0x55}], 0x1}, 0x0) 03:52:35 executing program 5: 03:52:35 executing program 2: 03:52:35 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) 03:52:35 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xd000000, 0x0, 0x0, 0x0) [ 1694.439030] netlink: 57 bytes leftover after parsing attributes in process `syz-executor1'. 03:52:35 executing program 2: 03:52:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 03:52:35 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) 03:52:35 executing program 5: 03:52:35 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="5500000018007f1dfd0000b2a4a280930a06000000a8430991000600ff031900a30700000000000000dc1338d5b3b7fcd6f6376acdaa7227c43ab8220000060cec4fab91d4fe6e0000000000000000000000000000", 0x55}], 0x1}, 0x0) 03:52:35 executing program 2: 03:52:35 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xe82, 0x0, 0x0, 0x0) 03:52:35 executing program 5: 03:52:35 executing program 2: 03:52:35 executing program 0: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='sysfs\x00', 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) [ 1694.787986] netlink: 57 bytes leftover after parsing attributes in process `syz-executor1'. 03:52:35 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfffffdfd, 0x0, 0x0, 0x0) 03:52:35 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="5500000018007f1dfd0000b2a4a280930a06000000a8430991000600ff031900a30700000000000000dc1338d5b3b7fcd6f6376acdaa7227c43ab8220000060cec4fab91d4fe6e0000000000000000000000000000", 0x55}], 0x1}, 0x0) 03:52:35 executing program 5: [ 1694.971019] netlink: 57 bytes leftover after parsing attributes in process `syz-executor1'. 03:52:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 03:52:35 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x8000000000000000, 0x0, 0x0, 0x0) 03:52:35 executing program 2: 03:52:35 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='sysfs\x00', 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) 03:52:35 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="5500000018007f1dfd0000b2a4a280930a06000000a8430991000600ff031900a30700000000000000dc1338d5b3b7fcd6f6376acdaa7227c43ab8220000060cec4fab91d4fe6e0000000000000000000000000000", 0x55}], 0x1}, 0x0) 03:52:35 executing program 5: 03:52:35 executing program 5: 03:52:35 executing program 2: 03:52:35 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000080)='sysfs\x00', 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) 03:52:35 executing program 1: r0 = socket$inet6(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="5500000018007f1dfd0000b2a4a280930a06000000a8430991000600ff031900a30700000000000000dc1338d5b3b7fcd6f6376acdaa7227c43ab8220000060cec4fab91d4fe6e0000000000000000000000000000", 0x55}], 0x1}, 0x0) 03:52:35 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1000000000, 0x0, 0x0, 0x0) 03:52:35 executing program 5: 03:52:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 03:52:36 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000080)='sysfs\x00', 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) 03:52:36 executing program 2: 03:52:36 executing program 1: socket$inet6(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="5500000018007f1dfd0000b2a4a280930a06000000a8430991000600ff031900a30700000000000000dc1338d5b3b7fcd6f6376acdaa7227c43ab8220000060cec4fab91d4fe6e0000000000000000000000000000", 0x55}], 0x1}, 0x0) 03:52:36 executing program 5: 03:52:36 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x3400, 0x0, 0x0, 0x0) 03:52:36 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000d80)=ANY=[@ANYBLOB=',\x00']) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$TIOCGETD(r2, 0x5424, &(0x7f00000002c0)) set_thread_area(&(0x7f0000000580)={0x7a, 0x20001800, 0x4000, 0x200, 0xffff, 0x1, 0x101, 0x2, 0x843, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000480)={0x2a, 0x4, 0x0, {0x1, 0xbe, 0x2, 0x0, [0x0, 0x0]}}, 0x2a) mount(&(0x7f0000000d40)=ANY=[@ANYBLOB="539b9105ab1072c24e2b98df1388f1adc93f6cb6cd0000000000000000000000000000"], 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000000240)="50020006ff000000000000007307dad96e0fcaf1388123e0289151094ecfc524136c4aa86fdd4dca7b004fa56469cf26d7db7ff8d6479a1368b4d9da4512e34b5015b7e78f357db6b25437fb", 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000380), &(0x7f0000000340)='./file0\x00', &(0x7f0000fdb000)='ubifs\x00', 0x80010, 0x0) mount(&(0x7f00002b9ff8), &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) r3 = dup2(r1, r1) ioctl$TCSBRKP(r3, 0x5425, 0x4) write$FUSE_OPEN(r3, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(r1, &(0x7f0000001400)=[{&(0x7f0000004200)=""/4096, 0x9d}], 0x1, 0x2) ioctl$int_out(r2, 0x2, &(0x7f0000000700)) link(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='./file0\x00') ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000140)) utimes(&(0x7f0000000440)='./file0\x00', &(0x7f0000000180)={{0x0, 0x7530}}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @multicast2}, 'lo\x00'}) r4 = dup(r0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x4c81, 0xfffffffffffffffe) 03:52:36 executing program 5: chdir(&(0x7f0000000180)='./file0\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) dup3(0xffffffffffffffff, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000840)) geteuid() stat(&(0x7f0000000880)='./file0\x00', 0x0) getpgid(0x0) getgid() getuid() 03:52:36 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, 0x0, 0x0) 03:52:36 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000080)='sysfs\x00', 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) 03:52:36 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x10000000, 0x0, 0x0, 0x0) 03:52:36 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 03:52:36 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x0, 0x0) 03:52:36 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) 03:52:36 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)}, 0x0) 03:52:36 executing program 5: chdir(&(0x7f0000000180)='./file0\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) dup3(0xffffffffffffffff, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000840)) geteuid() stat(&(0x7f0000000880)='./file0\x00', 0x0) getpgid(0x0) getgid() getuid() 03:52:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 03:52:36 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) read$FUSE(r1, 0x0, 0x0) 03:52:36 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x53540000, 0x0, 0x0, 0x0) 03:52:36 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{0x0}], 0x1}, 0x0) 03:52:36 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) 03:52:36 executing program 5: mkdir(0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='map_files\x00') getdents(r1, &(0x7f0000000040)=""/46, 0x2e) dup3(0xffffffffffffffff, r1, 0x80000) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_VL_READ(r1, 0x80047013, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) geteuid() stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getpgid(0x0) getgid() getuid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001000)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) stat(0x0, &(0x7f0000001140)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) fstat(0xffffffffffffffff, 0x0) getegid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000002d80)) getgroups(0x5, &(0x7f0000002ec0)=[0xee01, 0x0, 0xee01, 0xee01, 0xee01]) 03:52:36 executing program 2: mkdir(0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) dup3(0xffffffffffffffff, r0, 0x80000) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) geteuid() stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getpgid(0x0) getuid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001000)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) stat(0x0, &(0x7f0000001140)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getegid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002d80)) getgroups(0x5, &(0x7f0000002ec0)=[0xee01, 0x0, 0xee01, 0xee01, 0xee01]) 03:52:36 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1f000000, 0x0, 0x0, 0x0) 03:52:36 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)}], 0x1}, 0x0) 03:52:36 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) 03:52:37 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xff0f, 0x0, 0x0, 0x0) 03:52:37 executing program 2: mkdir(0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000300)) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) dup3(0xffffffffffffffff, r0, 0x80000) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) geteuid() stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getpgid(0x0) getgid() getuid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001000)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) stat(0x0, &(0x7f0000001140)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getegid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002d80)) getgroups(0x5, &(0x7f0000002ec0)=[0xee01, 0x0, 0xee01, 0xee01, 0xee01]) 03:52:37 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="5500000018007f1dfd0000b2a4a280930a06000000a8430991000600ff031900a30700000000000000dc13", 0x2b}], 0x1}, 0x0) 03:52:37 executing program 5: mkdir(0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000300)=0x0) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='map_files\x00') getdents(r1, &(0x7f0000000040)=""/46, 0x2e) dup3(0xffffffffffffffff, r1, 0x80000) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_VL_READ(r1, 0x80047013, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) geteuid() stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getpgid(0x0) getgid() getuid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001000)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) stat(0x0, &(0x7f0000001140)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) fstat(0xffffffffffffffff, 0x0) getegid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000002d80)) getgroups(0x5, &(0x7f0000002ec0)=[0xee01, 0x0, 0xee01, 0xee01, 0xee01]) 03:52:37 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4244, 0x0, 0x0, 0x0) 03:52:37 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='sysfs\x00', 0x0, 0x0) chmod(0x0, 0x0) 03:52:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 03:52:37 executing program 2: mkdir(0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000300)) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) dup3(0xffffffffffffffff, r0, 0x80000) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) geteuid() stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getpgid(0x0) getgid() getuid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001000)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) stat(0x0, &(0x7f0000001140)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getegid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002d80)) getgroups(0x5, &(0x7f0000002ec0)=[0xee01, 0x0, 0xee01, 0xee01, 0xee01]) 03:52:37 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x3400000000000000, 0x0, 0x0, 0x0) 03:52:37 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="5500000018007f1dfd0000b2a4a280930a06000000a8430991000600ff031900a30700000000000000dc13", 0x2b}], 0x1}, 0x0) 03:52:37 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xd, 0x9, 0x4, 0xe9, 0x0, r0}, 0x2c) 03:52:37 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000180)={0x8}) 03:52:37 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6000000, 0x0, 0x0, 0x0) 03:52:37 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xd9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) getpgrp(0xffffffffffffffff) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, 0x0) 03:52:37 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="5500000018007f1dfd0000b2a4a280930a06000000a8430991000600ff031900a30700000000000000dc13", 0x2b}], 0x1}, 0x0) 03:52:37 executing program 5: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) 03:52:37 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x8001}, 0x1c) [ 1696.964771] audit: type=1800 audit(2000001157.528:1413): pid=31219 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=17305 res=0 03:52:37 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4c00, 0x0, 0x0, 0x0) [ 1697.030999] audit: type=1804 audit(2000001157.568:1414): pid=31219 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir349982203/syzkaller.MrNGmf/2135/file0" dev="sda1" ino=17305 res=1 [ 1697.098047] audit: type=1800 audit(2000001157.628:1415): pid=31224 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor5" name="file0" dev="sda1" ino=17281 res=0 03:52:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 03:52:37 executing program 5: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) 03:52:37 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="5500000018007f1dfd0000b2a4a280930a06000000a8430991000600ff031900a30700000000000000dc1338d5b3b7fcd6f6376acdaa7227c43ab8220000060c", 0x40}], 0x1}, 0x0) 03:52:37 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) 03:52:37 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x40000000, 0x0, 0x0, 0x0) 03:52:37 executing program 2: [ 1697.368844] audit: type=1800 audit(2000001157.938:1416): pid=31239 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor5" name="file0" dev="sda1" ino=17309 res=0 03:52:38 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="5500000018007f1dfd0000b2a4a280930a06000000a8430991000600ff031900a30700000000000000dc1338d5b3b7fcd6f6376acdaa7227c43ab8220000060c", 0x40}], 0x1}, 0x0) [ 1697.769743] audit: type=1804 audit(2000001158.338:1417): pid=31225 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir349982203/syzkaller.MrNGmf/2135/file0" dev="sda1" ino=17305 res=1 03:52:38 executing program 5: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) 03:52:38 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5453, 0x0, 0x0, 0x0) 03:52:38 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="5500000018007f1dfd0000b2a4a280930a06000000a8430991000600ff031900a30700000000000000dc1338d5b3b7fcd6f6376acdaa7227c43ab8220000060c", 0x40}], 0x1}, 0x0) 03:52:38 executing program 2: 03:52:38 executing program 0: 03:52:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 03:52:38 executing program 2: 03:52:38 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="5500000018007f1dfd0000b2a4a280930a06000000a8430991000600ff031900a30700000000000000dc1338d5b3b7fcd6f6376acdaa7227c43ab8220000060cec4fab91d4fe6e00000000", 0x4b}], 0x1}, 0x0) [ 1697.943975] audit: type=1800 audit(2000001158.508:1418): pid=31259 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor5" name="file0" dev="sda1" ino=17320 res=0 03:52:38 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4442, 0x0, 0x0, 0x0) 03:52:38 executing program 0: 03:52:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 03:52:38 executing program 2: 03:52:38 executing program 5: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) 03:52:38 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="5500000018007f1dfd0000b2a4a280930a06000000a8430991000600ff031900a30700000000000000dc1338d5b3b7fcd6f6376acdaa7227c43ab8220000060cec4fab91d4fe6e00000000", 0x4b}], 0x1}, 0x0) 03:52:38 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5848, 0x0, 0x0, 0x0) 03:52:38 executing program 0: 03:52:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) [ 1698.154705] audit: type=1800 audit(2000001158.719:1419): pid=31278 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor5" name="file0" dev="sda1" ino=17319 res=0 03:52:38 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="5500000018007f1dfd0000b2a4a280930a06000000a8430991000600ff031900a30700000000000000dc1338d5b3b7fcd6f6376acdaa7227c43ab8220000060cec4fab91d4fe6e00000000", 0x4b}], 0x1}, 0x0) 03:52:38 executing program 2: 03:52:38 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x0, 0x0) 03:52:38 executing program 0: 03:52:38 executing program 5: 03:52:38 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="5500000018007f1dfd0000b2a4a280930a06000000a8430991000600ff031900a30700000000000000dc1338d5b3b7fcd6f6376acdaa7227c43ab8220000060cec4fab91d4fe6e000000000000000000", 0x50}], 0x1}, 0x0) 03:52:38 executing program 2: 03:52:38 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4000000, 0x0, 0x0, 0x0) 03:52:38 executing program 0: 03:52:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 03:52:39 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5000000, 0x0, 0x0, 0x0) 03:52:39 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="5500000018007f1dfd0000b2a4a280930a06000000a8430991000600ff031900a30700000000000000dc1338d5b3b7fcd6f6376acdaa7227c43ab8220000060cec4fab91d4fe6e000000000000000000", 0x50}], 0x1}, 0x0) 03:52:39 executing program 2: 03:52:39 executing program 5: 03:52:39 executing program 0: 03:52:39 executing program 2: 03:52:39 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="5500000018007f1dfd0000b2a4a280930a06000000a8430991000600ff031900a30700000000000000dc1338d5b3b7fcd6f6376acdaa7227c43ab8220000060cec4fab91d4fe6e000000000000000000", 0x50}], 0x1}, 0x0) 03:52:39 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x48580000, 0x0, 0x0, 0x0) 03:52:39 executing program 5: 03:52:39 executing program 0: 03:52:39 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="5500000018007f1dfd0000b2a4a280930a06000000a8430991000600ff031900a30700000000000000dc1338d5b3b7fcd6f6376acdaa7227c43ab8220000060cec4fab91d4fe6e000000000000000000000000", 0x53}], 0x1}, 0x0) 03:52:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 03:52:39 executing program 2: 03:52:39 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="5500000018007f1dfd0000b2a4a280930a06000000a8430991000600ff031900a30700000000000000dc1338d5b3b7fcd6f6376acdaa7227c43ab8220000060cec4fab91d4fe6e000000000000000000000000", 0x53}], 0x1}, 0x0) 03:52:39 executing program 0: 03:52:39 executing program 5: 03:52:39 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xd00, 0x0, 0x0, 0x0) 03:52:39 executing program 0: 03:52:39 executing program 2: 03:52:39 executing program 5: 03:52:39 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2200, 0x0, 0x0, 0x0) 03:52:39 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="5500000018007f1dfd0000b2a4a280930a06000000a8430991000600ff031900a30700000000000000dc1338d5b3b7fcd6f6376acdaa7227c43ab8220000060cec4fab91d4fe6e000000000000000000000000", 0x53}], 0x1}, 0x0) 03:52:39 executing program 2: 03:52:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0x0) 03:52:39 executing program 2: 03:52:39 executing program 0: 03:52:39 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x820e, 0x0, 0x0, 0x0) 03:52:39 executing program 5: 03:52:39 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="5500000018007f1dfd0000b2a4a280930a06000000a8430991000600ff031900a30700000000000000dc1338d5b3b7fcd6f6376acdaa7227c43ab8220000060cec4fab91d4fe6e00000000000000000000000000", 0x54}], 0x1}, 0x0) 03:52:39 executing program 0: 03:52:39 executing program 2: 03:52:39 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x3f00, 0x0, 0x0, 0x0) 03:52:39 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="5500000018007f1dfd0000b2a4a280930a06000000a8430991000600ff031900a30700000000000000dc1338d5b3b7fcd6f6376acdaa7227c43ab8220000060cec4fab91d4fe6e00000000000000000000000000", 0x54}], 0x1}, 0x0) 03:52:40 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_sfeatures={0x3b, 0x1, [{}]}}) 03:52:40 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="5500000018007f1dfd0000b2a4a280930a06000000a8430991000600ff031900a30700000000000000dc1338d5b3b7fcd6f6376acdaa7227c43ab8220000060cec4fab91d4fe6e00000000000000000000000000", 0x54}], 0x1}, 0x0) 03:52:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) 03:52:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 03:52:40 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 03:52:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r1, 0x8948, &(0x7f0000000200)={"67726530000000000000001000", @ifru_ivalue}) 03:52:40 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x0, 0x0) 03:52:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='bond0\x00', 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @local}, 0x80) setsockopt$inet_tcp_int(r1, 0x6, 0x4000000000013, &(0x7f0000000040), 0x4) sendmmsg(r1, &(0x7f00000002c0), 0x203, 0x0) 03:52:40 executing program 5: r0 = socket$kcm(0xa, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x7, 0x2}, 0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 03:52:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="23000000420081aee405e9a4000000000000c6ff07d800400300000000000000000000", 0x23}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000003ac0)=[{&(0x7f00000028c0)=""/102, 0x66}, {&(0x7f00000023c0)=""/221, 0xdd}, {&(0x7f0000002a40)=""/4096, 0x1000}, {&(0x7f0000000380)=""/44, 0x2c}, {&(0x7f0000003a40)=""/86, 0x56}], 0x5}, 0x0) 03:52:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) 03:52:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xf4c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c) close(r0) 03:52:40 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0) shutdown(r0, 0x0) 03:52:40 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x0, 0x0) 03:52:40 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000200)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="0180c200000000000000000081000000000c000000000000000001000000c21f21b9"], 0x0) 03:52:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) 03:52:40 executing program 2: capset(&(0x7f00000003c0)={0x19980330}, &(0x7f0000cc0000)) shmctl$SHM_UNLOCK(0x0, 0xc) 03:52:40 executing program 0: r0 = socket(0x2, 0x4002, 0x0) sendmsg(r0, &(0x7f0000001140)={&(0x7f0000000040)=@in6, 0xc, 0x0, 0x0, &(0x7f0000001100)=[{0x20, 0xffff, 0x4, "26d708c0c4fc26a4f57017"}], 0x20}, 0x4) 03:52:40 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x0, 0x0) 03:52:40 executing program 2: r0 = msgget(0xffffffffffffffff, 0x0) msgsnd(r0, 0xffffffffffffffff, 0x0, 0x0) 03:52:40 executing program 0: 03:52:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000010000000100000028c718ec5ea58971"], 0x18}, 0x0) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 03:52:40 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x8000a0, 0x0, 0x0, 0x0) 03:52:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000480)='attr/sockcreate\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1, 0x0) 03:52:40 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000040)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)="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", 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="400000000000000000000000000000000100000000000000050000000000000000000000006ba4c33b077800000000000000000000"], 0x35) io_submit(0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000005c0)) close(r0) syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/net\x00') 03:52:40 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x74000000, 0x0, 0x0, 0x0) 03:52:40 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='maps\x00') sendfile(r0, r1, 0x0, 0x80000001) 03:52:40 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$cgroup_subtree(r0, &(0x7f0000001c40)={[{0x2d, 'io'}]}, 0x4) 03:52:40 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000d80)=ANY=[@ANYBLOB=',']) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, 0x0) set_thread_area(&(0x7f0000000580)={0x7a, 0x20001800, 0x0, 0x200, 0xffff, 0x0, 0x101, 0x2, 0x843, 0x3}) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000480)={0x29, 0x4, 0x0, {0x0, 0xbe, 0x1, 0x0, [0x0]}}, 0x29) mount(0x0, 0x0, 0x0, 0x0, &(0x7f000000a000)) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000000240)="50020006ff000000000000007307dad96e0fcaf1388123e0289151094ecfc524136c4aa86fdd4dca7b004fa56469cf26d7db7ff8d6479a1368b4d9da4512e34b5015b7e78f357db6b25437fb", 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000380), &(0x7f0000000340)='./file0\x00', &(0x7f0000fdb000)='ubifs\x00', 0x80010, 0x0) mount(&(0x7f00002b9ff8), &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x4) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(r1, &(0x7f0000001400)=[{&(0x7f0000004200)=""/4096, 0x9d}], 0x1, 0x2) ioctl$int_out(r2, 0x2, &(0x7f0000000700)) link(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='./file0\x00') ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000140)) utimes(&(0x7f0000000440)='./file0\x00', &(0x7f0000000180)={{0x0, 0x7530}}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @multicast2}, 'lo\x00'}) r3 = dup(r0) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0x4c81, 0xfffffffffffffffe) 03:52:40 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/fscreate\x00') sendfile(r0, r1, 0x0, 0x80000001) 03:52:40 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x0, 0x0) 03:52:40 executing program 2: prlimit64(0x0, 0x7, &(0x7f00000001c0), 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x0, 0x0) 03:52:40 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ashmem\x00', 0x0, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000040)='system_u:object_r:ldconfig_cache_t:s0\x00', 0x26, 0x0) 03:52:40 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f0000000280)='IPVS\x00', 0x5, 0xffffffffffffffff) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) r3 = creat(&(0x7f0000000580)='./bus\x00', 0x0) io_setup(0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000000)) ioctl$RTC_IRQP_READ(r3, 0x8008700b, &(0x7f0000000640)) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="400000000000000000000000000000000100000000000000050000000000000000000000006ba4c33b0778000000000000000000000000000004000000000000000000000000"], 0x46) io_submit(0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) fstat(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000005c0)) setgid(r4) open(&(0x7f0000000600)='./bus\x00', 0x0, 0x140) inotify_init() close(r1) syz_genetlink_get_family_id$team(&(0x7f0000000740)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f00000041c0), &(0x7f0000004200)=0x14, 0x800) chroot(&(0x7f00000002c0)='./bus\x00') syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/net\x00') 03:52:40 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) close(r0) 03:52:40 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000d80)=ANY=[@ANYBLOB=',\x00']) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$TIOCGETD(r2, 0x5424, &(0x7f00000002c0)) set_thread_area(&(0x7f0000000580)={0x7a, 0x20001800, 0x4000, 0x200, 0xffff, 0x1, 0x101, 0x2, 0x843, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000480)={0x2a, 0x4, 0x0, {0x1, 0xbe, 0x2, 0x0, [0x0, 0x0]}}, 0x2a) mount(&(0x7f0000000d40)=ANY=[@ANYBLOB="539b9105ab1072c24e2b98df1388f1adc93f6cb6cd0000000000000000000000000000"], 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000000240)="50020006ff000000000000007307dad96e0fcaf1388123e0289151094ecfc524136c4aa86fdd4dca7b004fa56469cf26d7db7ff8d6479a1368b4d9da4512e34b5015b7e78f357db6b25437fb", 0x100000, &(0x7f0000444000)) r3 = dup(r0) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0x4c81, 0xfffffffffffffffe) 03:52:40 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ashmem\x00', 0x0, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, 0x0) 03:52:40 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') sendfile(r0, r1, 0x0, 0x80000001) [ 1700.373869] audit: type=1804 audit(2000001160.930:1420): pid=31447 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir738006016/syzkaller.3ld5Td/1786/bus" dev="sda1" ino=17342 res=1 03:52:41 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, 0x0) set_thread_area(&(0x7f0000000580)={0x7a, 0x20001800, 0x4000, 0x0, 0xffff, 0x1, 0x101, 0x0, 0x843, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000480)={0x29, 0x4, 0x0, {0x1, 0xbe, 0x1, 0x0, [0x0]}}, 0x29) mount(0x0, &(0x7f0000903000)='./file0\x00', &(0x7f0000000240)="50020006ff000000000000007307dad96e0fcaf1388123e0289151094ecfc524136c4aa86fdd4dca7b004fa56469cf26d7db7ff8d6479a1368b4d9da4512e34b5015b7e78f357db6b25437fb", 0x0, 0x0) mount(&(0x7f0000000380), &(0x7f0000000340)='./file0\x00', 0x0, 0x80010, 0x0) mount(0x0, &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) r3 = dup2(r1, r1) ioctl$TCSBRKP(r3, 0x5425, 0x4) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000500)=ANY=[], &(0x7f00000001c0)='.', &(0x7f00000007c0)='cgroup2\x00', 0x848, &(0x7f00000e7000)) preadv(r1, &(0x7f0000001400)=[{&(0x7f0000004200)=""/4096, 0x9d}], 0x1, 0x2) ioctl$int_out(r2, 0x2, &(0x7f0000000700)) link(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='./file0\x00') ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000140)) recvmmsg(r2, &(0x7f0000000c80)=[{{&(0x7f0000000500)=@nfc_llcp, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000740)=""/78, 0x4e, 0x2}, 0x3}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000800)=""/99, 0x63}, {&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000000880)=""/232, 0xe8}, {&(0x7f00000006c0)=""/38, 0x26}, {&(0x7f0000000980)=""/240, 0xf0}, {&(0x7f0000000a80)=""/28, 0x1c}, {&(0x7f0000000ac0)=""/41, 0x29}], 0x7, &(0x7f0000000b80)=""/228, 0xe4, 0xffff}, 0xfff}], 0x2, 0x2, &(0x7f0000000d00)={0x0, 0x989680}) utimes(&(0x7f0000000440)='./file0\x00', &(0x7f0000000180)={{0x0, 0x7530}}) close(r1) socket$inet_tcp(0x2, 0x1, 0x0) r4 = dup(r0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x4c81, 0xfffffffffffffffe) 03:52:41 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7a, 0x0, 0x0, 0x0) 03:52:41 executing program 5: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x31}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:52:41 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/icmp\x00') sendfile(r0, r1, 0x0, 0x80000001) 03:52:41 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f0000000280)='IPVS\x00', 0x5, 0xffffffffffffffff) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) r3 = creat(&(0x7f0000000580)='./bus\x00', 0x0) io_setup(0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000000)) ioctl$RTC_IRQP_READ(r3, 0x8008700b, &(0x7f0000000640)) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="400000000000000000000000000000000100000000000000050000000000000000000000006ba4c33b0778000000000000000000000000000004000000000000000000000000"], 0x46) io_submit(0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) fstat(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000005c0)) setgid(r4) open(&(0x7f0000000600)='./bus\x00', 0x0, 0x140) inotify_init() close(r1) syz_genetlink_get_family_id$team(&(0x7f0000000740)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f00000041c0), &(0x7f0000004200)=0x14, 0x800) chroot(&(0x7f00000002c0)='./bus\x00') syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/net\x00') [ 1700.466102] audit: type=1804 audit(2000001160.990:1421): pid=31447 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir738006016/syzkaller.3ld5Td/1786/bus" dev="sda1" ino=17342 res=1 03:52:41 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') close(r0) [ 1700.609047] audit: type=1804 audit(2000001161.000:1422): pid=31455 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir738006016/syzkaller.3ld5Td/1786/bus" dev="sda1" ino=17342 res=1 [ 1700.643378] cgroup: cgroup2: unknown option "" 03:52:41 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xd00000000000000, 0x0, 0x0, 0x0) 03:52:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/psched\x00') sendfile(r0, r1, &(0x7f0000000080)=0x78010e08, 0x8001) 03:52:41 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/psched\x00') sendfile(r0, r1, 0x0, 0x8001) [ 1700.702770] cgroup: cgroup2: unknown option "" 03:52:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$assume_authority(0x10, r1) 03:52:41 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f0000000080)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 03:52:41 executing program 2: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') sendfile(r0, r2, 0x0, 0x80000001) 03:52:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x10, 0x0, &(0x7f0000000000)) 03:52:41 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xd01000000000000, 0x0, 0x0, 0x0) 03:52:41 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00004ca000)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c0000000007ffffffff0000000000000000002108000100c1900000"], 0x1c}}, 0x0) 03:52:41 executing program 1: r0 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) bind$inet(r0, 0x0, 0x0) 03:52:41 executing program 4: unshare(0x40000) semtimedop(0x0, &(0x7f00000a8000)=[{0x0, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semop(0x0, &(0x7f0000000040)=[{0x0, 0x0, 0xffffffffffffffff}], 0x1) semctl$IPC_RMID(0x0, 0x0, 0x0) 03:52:41 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x72, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000)=0xda9, 0x4) openat$autofs(0xffffffffffffff9c, 0x0, 0x101000, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0xd8}, 0x0) 03:52:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) clone(0x20002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r1, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "0f00000000db000005000000641888bc"}, 0x20) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x7, &(0x7f0000000000)=0x6, 0x4) 03:52:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) 03:52:41 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)="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") perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x0, 0xffffffff99950272, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0x401, 0x10000, 0x6, 0x1ff, 0x81, 0x8, 0x5, 0x7fffffff, 0x7f, 0x0, 0x1ff, 0x3, 0x4, 0x445, 0x5, 0xffffffff00000000, 0x0, 0x5, 0x7f, 0x1c00000000, 0x9c, 0x46, 0x1000, 0xb92, 0xfffffffeffffffff, 0x7ff, 0x64e, 0x200, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x10810, 0x1, 0x100, 0x7, 0x9c3, 0x2}, 0x0, 0x2, r0, 0x9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={r1, 0x28, &(0x7f00000003c0)}, 0x36e) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)="2e2f6367726f2e6ee5742f73797a30000000", 0x200002, 0x0) socket$kcm(0xa, 0x5, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x249}, 0x20) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000240)={'veth0\x00', 0x600}) socket$kcm(0x29, 0x7, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x9, 0x0, 0x28, 0x6, 0x0, 0x401, 0x10c0, 0x8, 0xfffffffffffffffa, 0x2, 0x0, 0x4, 0x0, 0x2e5, 0x3, 0x81, 0x8f4, 0x9, 0x9, 0x8001, 0xfffffffffffffffa, 0xffffffffffffffc1, 0x4, 0xf823, 0x0, 0x2, 0x6, 0x1f69, 0xc5f00000, 0x2, 0x2, 0x8, 0xff, 0x7, 0x0, 0x589d, 0x0, 0x0, 0x4, @perf_config_ext={0x100000000}, 0x800, 0x100, 0x0, 0x7, 0x100000001, 0x80000000, 0x8}, 0x0, 0x9, 0xffffffffffffff9c, 0xa) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x4) write$cgroup_int(r2, &(0x7f0000000000)=0x8, 0x36) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x919) close(r2) 03:52:41 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x482b000000000000, 0x0, 0x0, 0x0) 03:52:41 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) 03:52:41 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)) 03:52:41 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x22000000, 0x0, 0x0, 0x0) 03:52:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) 03:52:41 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) close(r0) 03:52:41 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4d50, 0x0, 0x0, 0x0) 03:52:41 executing program 4: 03:52:41 executing program 0: 03:52:41 executing program 2: 03:52:41 executing program 5: 03:52:41 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3dad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88bc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e57e43a3e36bd48d2a85bf4fd4a804e83f2f3cf378a435af5e287d4e27337b4ada11b26219832ec6b2b38446b3b95fe3771e9f42ca30fb21e12f0a3d8bc2d85454af9fcc0232d8fd909448b01f46c593d31ea1c926465e35a4199079c3ca41128b17cb01fbf5b522be0fd02022ada37fecc14b6c8c8831883b85a1106f2f867020d529f17a350f20dd3bf51a98cfda70c2e3638a483fd3f87940bb478b07c4c110394c0093d17955089f2ca97bbe075124c9b1ff6500d536a95d96f03d48596e008bf0a028b539cec796cec9bf585eb80fe3e0d26") perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x0, 0xffffffff99950272, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0x401, 0x10000, 0x6, 0x1ff, 0x81, 0x8, 0x5, 0x7fffffff, 0x7f, 0x0, 0x1ff, 0x3, 0x4, 0x445, 0x5, 0xffffffff00000000, 0x0, 0x5, 0x7f, 0x1c00000000, 0x9c, 0x46, 0x1000, 0xb92, 0xfffffffeffffffff, 0x7ff, 0x64e, 0x200, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x10810, 0x1, 0x100, 0x7, 0x9c3, 0x2}, 0x0, 0x2, r0, 0x9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={r1, 0x28, &(0x7f00000003c0)}, 0x36e) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)="2e2f6367726f2e6ee5742f73797a30000000", 0x200002, 0x0) socket$kcm(0xa, 0x5, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x249}, 0x20) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000240)={'veth0\x00', 0x600}) socket$kcm(0x29, 0x7, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x9, 0x0, 0x28, 0x6, 0x0, 0x401, 0x10c0, 0x8, 0xfffffffffffffffa, 0x2, 0x0, 0x4, 0x0, 0x2e5, 0x3, 0x81, 0x8f4, 0x9, 0x9, 0x8001, 0xfffffffffffffffa, 0xffffffffffffffc1, 0x4, 0xf823, 0x0, 0x2, 0x6, 0x1f69, 0xc5f00000, 0x2, 0x2, 0x8, 0xff, 0x7, 0x0, 0x589d, 0x0, 0x0, 0x4, @perf_config_ext={0x100000000}, 0x800, 0x100, 0x0, 0x7, 0x100000001, 0x80000000, 0x8}, 0x0, 0x9, 0xffffffffffffff9c, 0xa) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x4) write$cgroup_int(r2, &(0x7f0000000000)=0x8, 0x36) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x919) close(r2) 03:52:41 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)="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") perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x0, 0xffffffff99950272, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0x401, 0x10000, 0x6, 0x1ff, 0x81, 0x8, 0x5, 0x7fffffff, 0x7f, 0x0, 0x1ff, 0x3, 0x4, 0x445, 0x5, 0xffffffff00000000, 0x0, 0x5, 0x7f, 0x1c00000000, 0x9c, 0x46, 0x1000, 0xb92, 0xfffffffeffffffff, 0x7ff, 0x64e, 0x200, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x10810, 0x1, 0x100, 0x7, 0x9c3, 0x2}, 0x0, 0x2, r0, 0x9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={r1, 0x28, &(0x7f00000003c0)}, 0x36e) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)="2e2f6367726f2e6ee5742f73797a30000000", 0x200002, 0x0) socket$kcm(0xa, 0x5, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x249}, 0x20) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000240)={'veth0\x00', 0x600}) socket$kcm(0x29, 0x7, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x9, 0x0, 0x28, 0x6, 0x0, 0x401, 0x10c0, 0x8, 0xfffffffffffffffa, 0x2, 0x0, 0x4, 0x0, 0x2e5, 0x3, 0x81, 0x8f4, 0x9, 0x9, 0x8001, 0xfffffffffffffffa, 0xffffffffffffffc1, 0x4, 0xf823, 0x0, 0x2, 0x6, 0x1f69, 0xc5f00000, 0x2, 0x2, 0x8, 0xff, 0x7, 0x0, 0x589d, 0x0, 0x0, 0x4, @perf_config_ext={0x100000000}, 0x800, 0x100, 0x0, 0x7, 0x100000001, 0x80000000, 0x8}, 0x0, 0x9, 0xffffffffffffff9c, 0xa) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x4) write$cgroup_int(r2, &(0x7f0000000000)=0x8, 0x36) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x919) close(r2) 03:52:42 executing program 2: 03:52:42 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x0, 0x0) 03:52:42 executing program 0: 03:52:42 executing program 5: 03:52:42 executing program 2: 03:52:42 executing program 0: 03:52:42 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xedc0, 0x0, 0x0, 0x0) 03:52:42 executing program 2: 03:52:42 executing program 1: 03:52:42 executing program 5: 03:52:42 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4d500000, 0x0, 0x0, 0x0) 03:52:42 executing program 4: 03:52:42 executing program 0: 03:52:42 executing program 1: 03:52:42 executing program 2: 03:52:42 executing program 5: 03:52:42 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x0, 0x0) 03:52:42 executing program 0: 03:52:42 executing program 1: 03:52:42 executing program 4: 03:52:42 executing program 2: 03:52:42 executing program 5: 03:52:42 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x48000000, 0x0, 0x0, 0x0) 03:52:42 executing program 5: 03:52:42 executing program 0: 03:52:42 executing program 4: 03:52:42 executing program 1: 03:52:42 executing program 2: 03:52:42 executing program 5: 03:52:42 executing program 0: 03:52:42 executing program 2: 03:52:42 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:52:42 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getpid() getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:52:42 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x300, 0x0, 0x0, 0x0) 03:52:42 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x20, 0x0) 03:52:42 executing program 2: r0 = socket$inet6(0xa, 0x10000100000003, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0x8}}, 0x1c) 03:52:42 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000a40)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x240, &(0x7f00000011c0)}}], 0x249, 0x0) 03:52:42 executing program 1: openat$selinux_user(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 03:52:42 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xc0ed0000, 0x0, 0x0, 0x0) 03:52:42 executing program 5: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x4011, r0, 0x0) 03:52:43 executing program 2: madvise(&(0x7f0000f97000/0x1000)=nil, 0x1000, 0xc) 03:52:43 executing program 1: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000400)=""/63) gettid() capset(0x0, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, &(0x7f0000000100), &(0x7f0000000140)={0x8}, &(0x7f0000000200), 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:52:43 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x68, 0x0, 0x0, 0x0) 03:52:43 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getpid() getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:52:43 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./file0\x00') r0 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r0, &(0x7f0000000a40)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x240, &(0x7f00000011c0)}}], 0x249, 0x0) 03:52:43 executing program 2: openat$random(0xffffffffffffff9c, &(0x7f0000000380)='/dev/urandom\x00', 0x0, 0x0) prctl$PR_GET_PDEATHSIG(0x25, &(0x7f0000000180)) 03:52:43 executing program 2: request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0) 03:52:43 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0) [ 1702.799463] syz-executor1 invoked oom-killer: gfp_mask=0x7200c2(GFP_HIGHUSER|__GFP_ACCOUNT), nodemask=(null), order=0, oom_score_adj=0 [ 1702.843991] syz-executor1 cpuset=syz1 mems_allowed=0 [ 1702.854470] CPU: 1 PID: 31655 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #151 [ 1702.861969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1702.871431] Call Trace: [ 1702.874033] dump_stack+0x244/0x39d [ 1702.877684] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1702.882895] dump_header+0x27b/0xf72 [ 1702.886628] ? mark_held_locks+0x130/0x130 [ 1702.890876] ? pagefault_out_of_memory+0x197/0x197 [ 1702.895913] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1702.901466] ? check_preemption_disabled+0x48/0x280 [ 1702.906505] ? zap_class+0x640/0x640 [ 1702.910224] ? __lock_is_held+0xb5/0x140 [ 1702.914322] ? zap_class+0x640/0x640 [ 1702.918046] ? print_usage_bug+0xc0/0xc0 [ 1702.922120] ? find_held_lock+0x36/0x1c0 [ 1702.926216] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1702.931778] ? find_held_lock+0x36/0x1c0 [ 1702.935854] ? mark_held_locks+0xc7/0x130 [ 1702.940012] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1702.945137] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1702.950261] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1702.954855] ? trace_hardirqs_on+0xbd/0x310 [ 1702.959192] ? kasan_check_read+0x11/0x20 [ 1702.963353] ? ___ratelimit+0x3b4/0x672 [ 1702.967351] ? trace_hardirqs_off_caller+0x310/0x310 [ 1702.972554] ? trace_hardirqs_on+0x310/0x310 [ 1702.976974] ? lock_downgrade+0x900/0x900 [ 1702.981133] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1702.986265] ? ___ratelimit+0x3b9/0x672 [ 1702.990253] ? idr_get_free+0xf70/0xf70 [ 1702.994236] ? _raw_spin_unlock_irq+0x27/0x80 [ 1702.998763] ? _raw_spin_unlock_irq+0x27/0x80 [ 1703.003273] oom_kill_process.cold.27+0x10/0x903 [ 1703.008039] ? _raw_spin_unlock_irq+0x27/0x80 [ 1703.012556] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1703.017163] ? oom_evaluate_task+0x540/0x540 [ 1703.021194] kauditd_printk_skb: 1 callbacks suppressed [ 1703.021207] audit: type=1400 audit(2000001163.431:1424): avc: denied { connect } for pid=31679 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1703.021588] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1703.056705] ? cgroup_procs_next+0x70/0x70 [ 1703.060929] ? _raw_spin_unlock_irq+0x60/0x80 [ 1703.065434] ? oom_badness+0xaa0/0xaa0 [ 1703.069314] ? mem_cgroup_scan_tasks+0x1c3/0x1e0 [ 1703.074055] ? mem_cgroup_iter_break+0x30/0x30 [ 1703.078636] ? mark_held_locks+0xc7/0x130 [ 1703.082771] out_of_memory+0xa84/0x1430 [ 1703.086730] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1703.091303] ? kasan_check_read+0x11/0x20 [ 1703.095439] ? oom_killer_disable+0x3a0/0x3a0 [ 1703.099938] mem_cgroup_out_of_memory+0x15e/0x210 [ 1703.104769] ? memory_oom_group_write+0x160/0x160 [ 1703.109599] ? memcg_kmem_charge_memcg+0x7c/0x120 [ 1703.114431] ? page_counter_try_charge+0x1c1/0x220 [ 1703.119353] try_charge+0xda9/0x1700 [ 1703.123059] ? mem_cgroup_from_task+0x1f0/0x1f0 [ 1703.127714] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1703.132630] ? kasan_check_read+0x11/0x20 [ 1703.136764] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1703.142025] ? rcu_softirq_qs+0x20/0x20 [ 1703.145993] ? get_mem_cgroup_from_mm.part.62+0x221/0x880 [ 1703.151519] ? percpu_ref_put_many+0x11c/0x260 [ 1703.156089] ? lock_page_memcg+0x350/0x350 [ 1703.160316] ? lock_acquire+0x1ed/0x520 [ 1703.164294] ? mem_cgroup_oom_control_write+0x100/0x100 [ 1703.169653] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1703.175184] ? check_preemption_disabled+0x48/0x280 [ 1703.180195] memcg_kmem_charge_memcg+0x7c/0x120 [ 1703.184848] ? memcg_kmem_put_cache+0xb0/0xb0 [ 1703.189334] ? __lock_is_held+0xb5/0x140 [ 1703.193386] memcg_kmem_charge+0x149/0x350 [ 1703.197608] __alloc_pages_nodemask+0x75e/0xea0 [ 1703.202266] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 1703.207291] ? perf_trace_sched_process_exec+0x860/0x860 [ 1703.212734] ? kasan_check_write+0x14/0x20 [ 1703.216961] ? copyin+0xb7/0x100 [ 1703.220318] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1703.225325] ? copy_page_from_iter+0x541/0x8f0 [ 1703.229897] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1703.235430] alloc_pages_current+0x173/0x350 [ 1703.239944] pipe_write+0x910/0xec0 [ 1703.243571] __vfs_write+0x6b8/0x9f0 [ 1703.247278] ? kernel_read+0x120/0x120 [ 1703.251149] ? __might_sleep+0x95/0x190 [ 1703.255107] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1703.260643] ? selinux_file_permission+0x90/0x540 [ 1703.265482] ? rw_verify_area+0x118/0x360 [ 1703.269620] vfs_write+0x1fc/0x560 [ 1703.273165] ksys_write+0x101/0x260 [ 1703.276782] ? __ia32_sys_read+0xb0/0xb0 [ 1703.280843] ? trace_hardirqs_off_caller+0x310/0x310 [ 1703.285941] __x64_sys_write+0x73/0xb0 [ 1703.289818] do_syscall_64+0x1b9/0x820 [ 1703.293691] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1703.299044] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1703.303961] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1703.308792] ? trace_hardirqs_on_caller+0x310/0x310 [ 1703.313795] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1703.318801] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1703.323806] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1703.328641] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1703.333814] RIP: 0033:0x457679 [ 1703.337002] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1703.355891] RSP: 002b:00007f098c899c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1703.363584] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457679 [ 1703.370842] RDX: 000000010000014c RSI: 0000000020000340 RDI: 0000000000000004 [ 1703.378097] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1703.385373] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f098c89a6d4 03:52:43 executing program 0: rt_sigaction(0x7, 0x0, &(0x7f0000000380)={0x0, {}, 0x0, 0x0}, 0x8, &(0x7f00000003c0)) 03:52:43 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getpid() getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:52:43 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, &(0x7f000000aac0)='/dev/null\x00', 0x5, 0x0) r0 = epoll_create1(0x80000) epoll_create1(0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x1, r1) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000140), &(0x7f0000000180)=0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000001, 0x110, 0xffffffffffffffff, 0x0) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000600)) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) getpeername$packet(r2, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000580)=0x14) sendfile(r2, r3, &(0x7f0000000300), 0x2000006) dup2(r1, r1) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f00000003c0)='keyring\x00', 0x0, 0x0, 0x0, r4) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000100)) close(r0) 03:52:43 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6000000000000000, 0x0, 0x0, 0x0) 03:52:43 executing program 0: openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbfc}, 0xc) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1703.392635] R13: 00000000004c2db5 R14: 00000000004da348 R15: 00000000ffffffff [ 1703.432823] Task in /syz1 killed as a result of limit of /syz1 [ 1703.470010] memory: usage 307180kB, limit 307200kB, failcnt 1444 [ 1703.524433] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1703.531326] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1703.555221] Memory cgroup stats for /syz1: cache:108KB rss:274304KB rss_huge:258048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:12KB active_anon:274312KB inactive_file:0KB active_file:8KB unevictable:0KB [ 1703.577863] Memory cgroup out of memory: Kill process 22353 (syz-executor1) score 1106 or sacrifice child [ 1703.588139] Killed process 22353 (syz-executor1) total-vm:70340kB, anon-rss:2192kB, file-rss:33636kB, shmem-rss:0kB [ 1703.603638] oom_reaper: reaped process 22353 (syz-executor1), now anon-rss:0kB, file-rss:32804kB, shmem-rss:0kB [ 1703.829480] syz-executor1 invoked oom-killer: gfp_mask=0x7200c2(GFP_HIGHUSER|__GFP_ACCOUNT), nodemask=(null), order=0, oom_score_adj=0 [ 1703.842011] syz-executor1 cpuset=syz1 mems_allowed=0 [ 1703.847335] CPU: 1 PID: 31692 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #151 [ 1703.854692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1703.864027] Call Trace: [ 1703.866621] dump_stack+0x244/0x39d [ 1703.870270] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1703.875455] dump_header+0x27b/0xf72 [ 1703.879173] ? mark_held_locks+0x130/0x130 [ 1703.883427] ? pagefault_out_of_memory+0x197/0x197 [ 1703.888357] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1703.893884] ? check_preemption_disabled+0x48/0x280 [ 1703.898893] ? zap_class+0x640/0x640 [ 1703.902641] ? __lock_is_held+0xb5/0x140 [ 1703.906691] ? zap_class+0x640/0x640 [ 1703.910391] ? print_usage_bug+0xc0/0xc0 [ 1703.914438] ? find_held_lock+0x36/0x1c0 [ 1703.918573] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1703.924106] ? find_held_lock+0x36/0x1c0 [ 1703.928159] ? mark_held_locks+0xc7/0x130 [ 1703.932293] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1703.937383] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1703.942476] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1703.947052] ? trace_hardirqs_on+0xbd/0x310 [ 1703.951364] ? kasan_check_read+0x11/0x20 [ 1703.955504] ? ___ratelimit+0x3b4/0x672 [ 1703.959464] ? trace_hardirqs_off_caller+0x310/0x310 [ 1703.964573] ? trace_hardirqs_on+0x310/0x310 [ 1703.968970] ? lock_downgrade+0x900/0x900 [ 1703.973108] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1703.978208] ? ___ratelimit+0x3b9/0x672 [ 1703.982193] ? idr_get_free+0xf70/0xf70 [ 1703.986154] ? _raw_spin_unlock_irq+0x27/0x80 [ 1703.990631] ? _raw_spin_unlock_irq+0x27/0x80 [ 1703.995119] oom_kill_process.cold.27+0x10/0x903 [ 1703.999865] ? _raw_spin_unlock_irq+0x27/0x80 [ 1704.004346] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1704.008917] ? oom_evaluate_task+0x540/0x540 [ 1704.013342] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1704.018907] ? cgroup_procs_next+0x70/0x70 [ 1704.023271] ? _raw_spin_unlock_irq+0x60/0x80 [ 1704.027778] ? oom_badness+0xaa0/0xaa0 [ 1704.031653] ? mem_cgroup_scan_tasks+0x1c3/0x1e0 [ 1704.036395] ? mem_cgroup_iter_break+0x30/0x30 [ 1704.040970] ? mark_held_locks+0xc7/0x130 [ 1704.045114] out_of_memory+0xa84/0x1430 [ 1704.049083] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1704.053660] ? kasan_check_read+0x11/0x20 [ 1704.057795] ? oom_killer_disable+0x3a0/0x3a0 [ 1704.062289] mem_cgroup_out_of_memory+0x15e/0x210 [ 1704.067230] ? memory_oom_group_write+0x160/0x160 [ 1704.072087] ? memcg_kmem_charge_memcg+0x7c/0x120 [ 1704.076941] ? page_counter_try_charge+0x1c1/0x220 [ 1704.081857] try_charge+0xda9/0x1700 [ 1704.085580] ? mem_cgroup_from_task+0x1f0/0x1f0 [ 1704.090251] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1704.095165] ? kasan_check_read+0x11/0x20 [ 1704.099297] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1704.104562] ? rcu_softirq_qs+0x20/0x20 [ 1704.108541] ? get_mem_cgroup_from_mm.part.62+0x221/0x880 [ 1704.114072] ? percpu_ref_put_many+0x11c/0x260 [ 1704.118643] ? lock_page_memcg+0x350/0x350 [ 1704.122865] ? lock_acquire+0x1ed/0x520 [ 1704.126823] ? mem_cgroup_oom_control_write+0x100/0x100 [ 1704.132172] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1704.137696] ? check_preemption_disabled+0x48/0x280 [ 1704.142702] memcg_kmem_charge_memcg+0x7c/0x120 [ 1704.147362] ? memcg_kmem_put_cache+0xb0/0xb0 [ 1704.151856] ? __lock_is_held+0xb5/0x140 [ 1704.155907] memcg_kmem_charge+0x149/0x350 [ 1704.160132] __alloc_pages_nodemask+0x75e/0xea0 [ 1704.164877] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 1704.169883] ? perf_trace_sched_process_exec+0x860/0x860 [ 1704.175326] ? kasan_check_write+0x14/0x20 [ 1704.179544] ? copyin+0xb7/0x100 [ 1704.182919] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1704.187915] ? copy_page_from_iter+0x541/0x8f0 [ 1704.192482] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1704.198021] alloc_pages_current+0x173/0x350 [ 1704.202422] pipe_write+0x910/0xec0 [ 1704.206065] __vfs_write+0x6b8/0x9f0 [ 1704.209768] ? kernel_read+0x120/0x120 [ 1704.213639] ? __might_sleep+0x95/0x190 [ 1704.217600] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1704.223146] ? selinux_file_permission+0x90/0x540 [ 1704.227991] ? rw_verify_area+0x118/0x360 [ 1704.232126] vfs_write+0x1fc/0x560 [ 1704.235654] ksys_write+0x101/0x260 [ 1704.239269] ? __ia32_sys_read+0xb0/0xb0 [ 1704.243316] ? trace_hardirqs_off_caller+0x310/0x310 [ 1704.248419] __x64_sys_write+0x73/0xb0 [ 1704.252304] do_syscall_64+0x1b9/0x820 [ 1704.256211] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1704.261583] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1704.266499] ? trace_hardirqs_on_caller+0x310/0x310 [ 1704.271499] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1704.276503] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1704.283155] ? __switch_to_asm+0x40/0x70 [ 1704.287202] ? __switch_to_asm+0x34/0x70 [ 1704.291253] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1704.296090] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1704.301266] RIP: 0033:0x457679 [ 1704.304449] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1704.323335] RSP: 002b:00007f098c836c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1704.331042] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457679 [ 1704.338303] RDX: 000000010000014c RSI: 0000000020000340 RDI: 0000000000000008 [ 1704.345564] RBP: 000000000072c0e0 R08: 0000000000000000 R09: 0000000000000000 [ 1704.352819] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f098c8376d4 [ 1704.360082] R13: 00000000004c2db5 R14: 00000000004da348 R15: 00000000ffffffff [ 1704.369086] Task in /syz1 killed as a result of limit of /syz1 [ 1704.375177] memory: usage 307132kB, limit 307200kB, failcnt 1566 [ 1704.381317] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1704.388221] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1704.394428] Memory cgroup stats for /syz1: cache:108KB rss:274296KB rss_huge:256000KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:12KB active_anon:274292KB inactive_file:4KB active_file:4KB unevictable:0KB [ 1704.415584] Memory cgroup out of memory: Kill process 22930 (syz-executor1) score 1106 or sacrifice child 03:52:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x200000000000009}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r1, &(0x7f0000eed000), 0x0}, 0x20) 03:52:45 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2000000000000, 0x0, 0x0, 0x0) 03:52:45 executing program 0: sched_setaffinity(0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbfc}, 0xc) 03:52:45 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, &(0x7f000000aac0)='/dev/null\x00', 0x5, 0x0) r0 = epoll_create1(0x80000) epoll_create1(0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x1, r1) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000140), &(0x7f0000000180)=0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000001, 0x110, 0xffffffffffffffff, 0x0) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000600)) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) getpeername$packet(r2, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000580)=0x14) sendfile(r2, r3, &(0x7f0000000300), 0x2000006) dup2(r1, r1) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f00000003c0)='keyring\x00', 0x0, 0x0, 0x0, r4) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000100)) close(r0) 03:52:45 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getpid() getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:52:45 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, &(0x7f000000aac0)='/dev/null\x00', 0x5, 0x0) r0 = epoll_create1(0x80000) epoll_create1(0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x1, r1) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000140), &(0x7f0000000180)=0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000001, 0x110, 0xffffffffffffffff, 0x0) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000600)) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) getpeername$packet(r2, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000580)=0x14) sendfile(r2, r3, &(0x7f0000000300), 0x2000006) dup2(r1, r1) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f00000003c0)='keyring\x00', 0x0, 0x0, 0x0, r4) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000100)) close(r0) [ 1704.425389] Killed process 22930 (syz-executor1) total-vm:70340kB, anon-rss:2192kB, file-rss:33628kB, shmem-rss:0kB [ 1704.436823] oom_reaper: reaped process 22930 (syz-executor1), now anon-rss:0kB, file-rss:32796kB, shmem-rss:0kB [ 1704.447732] oom_reaper: reaped process 31658 (syz-executor1), now anon-rss:0kB, file-rss:32784kB, shmem-rss:0kB 03:52:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000240)={0x40000006655}, 0x4) 03:52:45 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0) 03:52:45 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getpid() getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:52:45 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)=@known='user.syz\x00', 0x0, 0x0, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000004fc0)=@known='user.syz\x00', &(0x7f0000005000)=""/171, 0xab) 03:52:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'bond0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0xffffffffffff960c}}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 03:52:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000240)={0x40000006655}, 0x4) 03:52:45 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 03:52:45 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xedc000000000, 0x0, 0x0, 0x0) 03:52:45 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0xfffffffffffffffe) lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)=@known='user.syz\x00', 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000004fc0)=@known='user.syz\x00', &(0x7f0000005000)=""/171, 0xab) 03:52:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3ffffffffc, 0x31, 0xffffffffffffffff, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f0000000040)) 03:52:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000240)={0x40000006655}, 0x4) 03:52:45 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getpid() getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:52:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) 03:52:45 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xff0f000000000000, 0x0, 0x0, 0x0) 03:52:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000240)={0x40000006655}, 0x4) 03:52:45 executing program 1: 03:52:45 executing program 5: 03:52:45 executing program 2: 03:52:45 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfcfdffff00000000, 0x0, 0x0, 0x0) 03:52:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000240)={0x40000006655}, 0x4) 03:52:45 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getpid() getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:52:45 executing program 1: 03:52:45 executing program 5: 03:52:45 executing program 2: 03:52:45 executing program 2: 03:52:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000240)={0x40000006655}, 0x4) 03:52:45 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4800, 0x0, 0x0, 0x0) 03:52:45 executing program 1: 03:52:45 executing program 5: 03:52:45 executing program 2: 03:52:45 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:52:45 executing program 5: 03:52:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000240)={0x40000006655}, 0x4) 03:52:45 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4000, 0x0, 0x0, 0x0) 03:52:45 executing program 1: 03:52:45 executing program 2: 03:52:46 executing program 5: 03:52:46 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffa0008000, 0x0, 0x0, 0x0) 03:52:46 executing program 2: 03:52:46 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:52:46 executing program 1: 03:52:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240)={0x40000006655}, 0x4) 03:52:46 executing program 5: 03:52:46 executing program 2: 03:52:46 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x34, 0x0, 0x0, 0x0) 03:52:46 executing program 1: 03:52:46 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:52:46 executing program 5: 03:52:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000240)={0x40000006655}, 0x4) 03:52:46 executing program 2: 03:52:46 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x0, 0x0) 03:52:46 executing program 1: 03:52:46 executing program 5: 03:52:46 executing program 1: 03:52:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000240)={0x40000006655}, 0x4) 03:52:46 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:52:46 executing program 2: 03:52:46 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x0, 0x0) 03:52:46 executing program 5: 03:52:46 executing program 1: 03:52:46 executing program 5: 03:52:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000240)={0x40000006655}, 0x4) 03:52:46 executing program 2: 03:52:46 executing program 1: 03:52:46 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7a00, 0x0, 0x0, 0x0) 03:52:46 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:52:46 executing program 5: 03:52:46 executing program 2: 03:52:46 executing program 5: 03:52:46 executing program 1: 03:52:46 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000240)={0x40000006655}, 0x4) 03:52:46 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x900, 0x0, 0x0, 0x0) 03:52:46 executing program 2: 03:52:46 executing program 5: 03:52:46 executing program 1: 03:52:46 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000240)={0x40000006655}, 0x4) 03:52:46 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:52:46 executing program 5: 03:52:46 executing program 2: 03:52:46 executing program 1: 03:52:46 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4d50000000000000, 0x0, 0x0, 0x0) 03:52:46 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000240)={0x40000006655}, 0x4) 03:52:46 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:52:47 executing program 5: 03:52:47 executing program 1: 03:52:47 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000240)={0x40000006655}, 0x4) 03:52:47 executing program 2: 03:52:47 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x0, 0x0) 03:52:47 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:52:47 executing program 5: 03:52:47 executing program 1: 03:52:47 executing program 2: 03:52:47 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000240)={0x40000006655}, 0x4) 03:52:47 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x0, 0x0) 03:52:47 executing program 1: 03:52:47 executing program 2: 03:52:47 executing program 4: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:52:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x2000000011, 0x2, 0x0) sendto$inet6(r1, &(0x7f0000000180)="957a88cae59c5fd2c4b929f72305bc00f1ebb6e7", 0x14, 0x0, 0x0, 0x0) 03:52:47 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2300000000000000, 0x0, 0x0, 0x0) 03:52:47 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000240)={0x40000006655}, 0x4) 03:52:47 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="0207b609020000000000000000000000"], 0x10}}, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) 03:52:47 executing program 1: socketpair$unix(0x1, 0x8000000000002, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/protocols\x00') dup2(r1, r2) preadv(r2, &(0x7f0000000540)=[{&(0x7f0000000440)=""/217, 0xd9}], 0x1, 0x0) 03:52:47 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:52:47 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xa00, 0x0, 0x0, 0x0) 03:52:47 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:52:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000240)={0x40000006655}, 0x4) 03:52:47 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) 03:52:47 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) flock(r0, 0x1) flock(r1, 0x2) flock(r0, 0x2) 03:52:47 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x0, 0x0) 03:52:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000240)={0x40000006655}, 0x4) 03:52:47 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:52:47 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:52:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000240)={0x40000006655}, 0x4) 03:52:47 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x65, &(0x7f00000000c0), 0x54deded00158a180) setsockopt$sock_attach_bpf(r0, 0x1, 0x28, &(0x7f00000001c0), 0xfce9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 03:52:47 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x0, 0x0) 03:52:47 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:52:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000240)={0x40000006655}, 0x4) 03:52:47 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4000000000000, 0x0, 0x0, 0x0) 03:52:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000240)={0x40000006655}, 0x4) 03:52:48 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r1, &(0x7f0000001800)={&(0x7f00000000c0)=@in={0x2, 0x0, @multicast2}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x40010}, 0x24000804) 03:52:48 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:52:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000240)={0x40000006655}, 0x4) 03:52:48 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7000000, 0x0, 0x0, 0x0) 03:52:50 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:52:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000240)={0x40000006655}, 0x4) 03:52:50 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7400, 0x0, 0x0, 0x0) 03:52:50 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000900)={0x14, 0x11, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) 03:52:50 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:52:50 executing program 5: mknod(&(0x7f00000000c0)='./bus\x00', 0x4000000000008000, 0x6c7) r0 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/140, 0x8c}], 0x1000000000000129) 03:52:50 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6c00, 0x0, 0x0, 0x0) 03:52:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000240)={0x40000006655}, 0x4) 03:52:50 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:52:50 executing program 5: r0 = memfd_create(&(0x7f0000000380)='#vmnet1nodevem1\x00', 0x0) write(r0, &(0x7f0000002000)='.', 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)) 03:52:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) unshare(0x8000400) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:52:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000240)={0x40000006655}, 0x4) 03:52:50 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2000, 0x0, 0x0, 0x0) 03:52:50 executing program 5: 03:52:50 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:52:51 executing program 1: 03:52:53 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:52:53 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x23000000, 0x0, 0x0, 0x0) 03:52:53 executing program 5: 03:52:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000240)={0x40000006655}, 0x4) 03:52:53 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:52:53 executing program 1: 03:52:53 executing program 5: 03:52:53 executing program 1: 03:52:53 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x700, 0x0, 0x0, 0x0) 03:52:53 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:52:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8d453ce31b8c9467c0b4950243cedd45", 0x10) 03:52:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000240)={0x40000006655}, 0x4) 03:52:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) 03:52:56 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:52:56 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x600, 0x0, 0x0, 0x0) 03:52:56 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:52:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-sse2\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="8b5ec01ad1440182099e997613aa277c", 0x10, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000040)=""/72, 0xb9aedb) 03:52:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000240)={0x40000006655}, 0x4) 03:52:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-sse2\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="8b", 0x1, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000040)=""/72, 0xb9aedb) 03:52:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000240)={0x40000006655}, 0x4) 03:52:56 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6b6b6b00000000, 0x0, 0x0, 0x0) 03:52:56 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:52:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000240)={0x40000006655}, 0x4) 03:52:57 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x23) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") select(0x40, &(0x7f00000000c0), 0x0, &(0x7f00000002c0)={0x3}, 0x0) 03:52:59 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$cont(0x18, r0, 0x0, 0x0) 03:52:59 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x0, 0x0) 03:52:59 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) close(r0) socket$netlink(0x10, 0x3, 0xc) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x8000fffffffe) 03:52:59 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:52:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000240)={0x40000006655}, 0x4) 03:52:59 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) 03:52:59 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xf5ffffff, 0x0, 0x0, 0x0) 03:52:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000240)={0x40000006655}, 0x4) 03:52:59 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:53:00 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000005100)="7374617409e9dcdf020298ccf352df2deac8c177ff171248e91193510a49f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a56050711ad9e6a6f5eaad84736692df8fe2a683c431700648a85407da82f0cac1031dcd524ce71e517ec5530cbdddcb18c5618b5a1f9717e5a3da169110aa4a41bedb1a7fb141c8c22ea2a55e9aa26778b9f65bae7139c5", 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getuid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) getuid() 03:53:00 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000240)={0x40000006655}, 0x4) 03:53:00 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1f00, 0x0, 0x0, 0x0) 03:53:03 executing program 1: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc018620c, &(0x7f000000dfd0)={0xffffffffffffffa0, 0x0, 0x0, 0x1d0, 0x0, 0x0}) 03:53:03 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, 0x0, 0x0, 0x0) 03:53:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x0) 03:53:03 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:53:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, 0x0, 0x0) 03:53:03 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000240), 0x4) 03:53:03 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x0, 0x0) 03:53:03 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"7665630000000000000c0000bd6800", 0x43732e5398416f1e}) dup2(r0, r1) 03:53:03 executing program 1: syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') 03:53:03 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:53:03 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:03 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xf5ffffff00000000, 0x0, 0x0, 0x0) 03:53:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000240), 0x4) 03:53:03 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000010000/0x4000)=nil, 0x4000, 0x0, 0x20011, r0, 0x0) 03:53:03 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x10, 0x0, 0x0, 0x0) 03:53:03 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:53:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000240), 0x4) 03:53:03 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f0000000100)="c8a8707470", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)="16", 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) socketpair$unix(0x1, 0x20002000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_aout(r1, &(0x7f0000000380), 0x20) sendfile(r0, r1, 0x0, 0x2000005) 03:53:03 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfdfdffff, 0x0, 0x0, 0x0) 03:53:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, 0x0) 03:53:03 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 03:53:03 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) 03:53:06 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xd01, 0x0, 0x0, 0x0) 03:53:06 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:53:06 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:06 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) 03:53:06 executing program 1: creat(0x0, 0x86) ioctl$TCGETA(0xffffffffffffffff, 0x5405, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getgid() lchown(&(0x7f0000000180)='./file0\x00', r0, 0x0) 03:53:06 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)="2f70726f632f7379732f0000000e000000000000072f6578706972655f6e6f646573745f636f6e6e00", 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfe3000)=nil, 0xfe3000, 0x3, 0x32, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fchdir(r0) 03:53:06 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x0, 0x0) [ 1725.691613] binder: BINDER_SET_CONTEXT_MGR already set [ 1725.708472] binder: 32195:32205 ioctl 40046207 0 returned -16 03:53:06 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66696c653020e80a77"], 0xe) sysfs$1(0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 03:53:06 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:53:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000140)) 03:53:06 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6b6b6b, 0x0, 0x0, 0x0) 03:53:06 executing program 0: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc018620c, &(0x7f000000dfd0)={0xffffffffffffffa0, 0x0, 0x0, 0x1d0, 0x0, 0x0}) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, 0x0) 03:53:06 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = gettid() openat$selinux_context(0xffffffffffffff9c, 0x0, 0x2, 0x0) clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x200, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0) alarm(0x5519) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ioctl$TIOCCBRK(r1, 0x5428) ptrace(0x10, r0) 03:53:06 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x3, 0x0, 0x0, 0x0) 03:53:09 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:09 executing program 1: 03:53:09 executing program 5: 03:53:09 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(0x0, 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:53:09 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x0, 0x0) 03:53:09 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = gettid() openat$selinux_context(0xffffffffffffff9c, 0x0, 0x2, 0x0) clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x200, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0) alarm(0x5519) r1 = memfd_create(&(0x7f0000000e40)="0000000000007225f78380807dde5053601841a0d0f82b74374852b01f125997622dc4a5e71d2ce5ac32ff90824fa25e590704894da740f7e9c0ffb42c356a1f285bfc8f0b8c6f72ef151dab4c5c2a5a751f04bfc69ac5c3b5168a6d13d826b1ed0c7527d58f54adc12fca1f25c8fc2586ea4d90f84dabcdec291fb780a39a117d12b0893b182098dceed33b222a1d413709ae355d4d297fe42c5d4e9d8bbd9d0c709cae47e88f8aa2aa505b3e995b501f0d3753cd3510e87436612b401305f316177f6d4d4c70fd9d2621c3707ad88da7852596d89a59cb74505e675ac6ebc03faa3ee99889176b571135031afc973c52c5f6437b8143002b30d8fb92011c4994cc024e40497b2daeb06ad5308af486d0178a418f6bdb6940f07dc6e5cf1a3c852b401e3ecec45d22fd68c5bd0c9dce09627928411b83f68bf7be4b21fdf0033cf949b8a76aa65d68ad885967c2cc3c2d60ec74fcf5de162c94ffe3e15775c1a1cfd9818d4c17a2f8d0a7302538f079e7b128ef123c8bb909000000000000003814c2aea86c35fbf4244a64635d32ff12e4dcb3df56e5d5d3882a9984993f8a7fef72d875d21c1e3bb2bc3e6e79a2b6d322f710f0378abc2095d32139e39f3223db9961309295e4c3c8e1b0001dd757aa000000000000000000000000000008eca80c7b0c000000", 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ioctl$TIOCCBRK(r1, 0x5428) ptrace(0x10, r0) 03:53:09 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = gettid() openat$selinux_context(0xffffffffffffff9c, 0x0, 0x2, 0x0) clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x200, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0) alarm(0x5519) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ioctl$TIOCCBRK(r1, 0x5428) ptrace(0x10, r0) 03:53:09 executing program 5: 03:53:09 executing program 1: 03:53:09 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x0, 0x0) 03:53:09 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:53:09 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:09 executing program 1: 03:53:09 executing program 5: 03:53:09 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1f00000000000000, 0x0, 0x0, 0x0) 03:53:09 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = gettid() openat$selinux_context(0xffffffffffffff9c, 0x0, 0x2, 0x0) clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x200, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0) alarm(0x5519) r1 = memfd_create(&(0x7f0000000e40)="0000000000007225f78380807dde5053601841a0d0f82b74374852b01f125997622dc4a5e71d2ce5ac32ff90824fa25e590704894da740f7e9c0ffb42c356a1f285bfc8f0b8c6f72ef151dab4c5c2a5a751f04bfc69ac5c3b5168a6d13d826b1ed0c7527d58f54adc12fca1f25c8fc2586ea4d90f84dabcdec291fb780a39a117d12b0893b182098dceed33b222a1d413709ae355d4d297fe42c5d4e9d8bbd9d0c709cae47e88f8aa2aa505b3e995b501f0d3753cd3510e87436612b401305f316177f6d4d4c70fd9d2621c3707ad88da7852596d89a59cb74505e675ac6ebc03faa3ee99889176b571135031afc973c52c5f6437b8143002b30d8fb92011c4994cc024e40497b2daeb06ad5308af486d0178a418f6bdb6940f07dc6e5cf1a3c852b401e3ecec45d22fd68c5bd0c9dce09627928411b83f68bf7be4b21fdf0033cf949b8a76aa65d68ad885967c2cc3c2d60ec74fcf5de162c94ffe3e15775c1a1cfd9818d4c17a2f8d0a7302538f079e7b128ef123c8bb909000000000000003814c2aea86c35fbf4244a64635d32ff12e4dcb3df56e5d5d3882a9984993f8a7fef72d875d21c1e3bb2bc3e6e79a2b6d322f710f0378abc2095d32139e39f3223db9961309295e4c3c8e1b0001dd757aa000000000000000000000000000008eca80c7b0c000000", 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ioctl$TIOCCBRK(r1, 0x5428) ptrace(0x10, r0) 03:53:09 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x2000200007fc, &(0x7f0000000040)={0x2, 0x3, @loopback}, 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f00000000c0), 0x4) sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x1}}, 0x0) 03:53:09 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:09 executing program 1: open(&(0x7f0000000000)='./bus\x00', 0x47b, 0x2000000040) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:mount_exec_t:s0\x00', 0x22, 0x0) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 03:53:09 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x68000000, 0x0, 0x0, 0x0) 03:53:09 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lgetxattr(0x0, &(0x7f0000000100)=@random={'osx.', 'proc:mime_type\x00'}, 0x0, 0x0) 03:53:09 executing program 1: open(&(0x7f0000000000)='./bus\x00', 0x47b, 0x2000000040) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:mount_exec_t:s0\x00', 0x22, 0x0) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 03:53:09 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x97ffffff00000000, 0x0, 0x0, 0x0) 03:53:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000580)={"6eac1f47cb2c4bf7c7000000000800", 0x100000000002}) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3000002, 0x132, 0xffffffffffffffff, 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f00000001c0)) 03:53:09 executing program 1: open(&(0x7f0000000000)='./bus\x00', 0x47b, 0x2000000040) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:mount_exec_t:s0\x00', 0x22, 0x0) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 03:53:09 executing program 1: open(&(0x7f0000000000)='./bus\x00', 0x47b, 0x2000000040) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:mount_exec_t:s0\x00', 0x22, 0x0) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 03:53:09 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, 0x0, 0x0, 0x0) 03:53:12 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) exit(0x0) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000100)={0x9}, &(0x7f0000000140)={0x0, 0x1c9c380}, 0x0) 03:53:12 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x0, 0x0) 03:53:12 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:12 executing program 1: open(&(0x7f0000000000)='./bus\x00', 0x47b, 0x2000000040) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 03:53:12 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000200)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fsetxattr$security_selinux(r1, &(0x7f0000000000)='security.selinux\x00', 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB='b']) 03:53:12 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, 0x0, 0x0, 0x0) 03:53:12 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x40000, 0x0, 0x0, 0x0) 03:53:12 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x23, 0x0, 0x0, 0x0) 03:53:12 executing program 1: open(&(0x7f0000000000)='./bus\x00', 0x47b, 0x2000000040) lsetxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:mount_exec_t:s0\x00', 0x22, 0x0) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 03:53:12 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, 0x0, 0x0, 0x0) 03:53:12 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, 0x0, 0x0, 0x0) 03:53:13 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x60, 0x0, 0x0, 0x0) 03:53:13 executing program 0: 03:53:13 executing program 5: 03:53:15 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:15 executing program 1: clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:mount_exec_t:s0\x00', 0x22, 0x0) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 03:53:15 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4858000000000000, 0x0, 0x0, 0x0) 03:53:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000000c0)=ANY=[@ANYBLOB="00f6127cddee"], 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000005000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:53:15 executing program 5: 03:53:15 executing program 0: 03:53:15 executing program 1: open(0x0, 0x47b, 0x2000000040) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:mount_exec_t:s0\x00', 0x22, 0x0) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 03:53:15 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xffffff7f00000000, 0x0, 0x0, 0x0) 03:53:15 executing program 5: 03:53:15 executing program 0: 03:53:15 executing program 4: 03:53:15 executing program 1: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x2000000040) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:mount_exec_t:s0\x00', 0x22, 0x0) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 03:53:18 executing program 0: 03:53:18 executing program 4: 03:53:18 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000000c0)=""/91, 0x5b) 03:53:18 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4858, 0x0, 0x0, 0x0) 03:53:18 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:18 executing program 1: open(&(0x7f0000000000)='./bus\x00', 0x47b, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:mount_exec_t:s0\x00', 0x22, 0x0) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 03:53:18 executing program 0: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x1) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb50", 0x28}], 0x1}, 0x0) 03:53:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x3) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 03:53:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @local, @loopback}, 0xc) 03:53:18 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5354, 0x0, 0x0, 0x0) 03:53:18 executing program 1: open(&(0x7f0000000000)='./bus\x00', 0x47b, 0x2000000040) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:mount_exec_t:s0\x00', 0x22, 0x0) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 03:53:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000001440)={0xa, 0x4e22}, 0x1c) listen(r0, 0x101) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c) accept4(r0, 0x0, 0x0, 0x0) 03:53:18 executing program 0: socketpair$unix(0x1, 0x4000000000000002, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = memfd_create(&(0x7f0000000200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) read$FUSE(r2, &(0x7f00000005c0), 0x1000) close(r1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 03:53:18 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xffffff7f, 0x0, 0x0, 0x0) 03:53:18 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) prctl$PR_SET_DUMPABLE(0x4, 0x0) ptrace(0x10, r0) 03:53:19 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xe00, 0x0, 0x0, 0x0) [ 1739.172816] syz-executor4 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null), order=3, oom_score_adj=0 [ 1739.185363] syz-executor4 cpuset=syz4 mems_allowed=0 [ 1739.190740] CPU: 1 PID: 32449 Comm: syz-executor4 Not tainted 4.20.0-rc6+ #151 [ 1739.198114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1739.207463] Call Trace: [ 1739.210044] dump_stack+0x244/0x39d [ 1739.213667] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1739.218857] dump_header+0x27b/0xf72 [ 1739.222585] ? mark_held_locks+0x130/0x130 [ 1739.226823] ? pagefault_out_of_memory+0x197/0x197 [ 1739.231845] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1739.237377] ? check_preemption_disabled+0x48/0x280 [ 1739.237402] ? zap_class+0x640/0x640 [ 1739.237415] ? __lock_is_held+0xb5/0x140 [ 1739.237436] ? zap_class+0x640/0x640 [ 1739.237452] ? print_usage_bug+0xc0/0xc0 [ 1739.246161] ? find_held_lock+0x36/0x1c0 [ 1739.246180] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1739.246198] ? find_held_lock+0x36/0x1c0 [ 1739.246229] ? mark_held_locks+0xc7/0x130 [ 1739.275813] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1739.280914] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1739.286011] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1739.290593] ? trace_hardirqs_on+0xbd/0x310 [ 1739.294900] ? kasan_check_read+0x11/0x20 [ 1739.299038] ? ___ratelimit+0x3b4/0x672 [ 1739.302999] ? trace_hardirqs_off_caller+0x310/0x310 [ 1739.308102] ? trace_hardirqs_on+0x310/0x310 [ 1739.312517] ? lock_downgrade+0x900/0x900 [ 1739.316665] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1739.321755] ? ___ratelimit+0x3b9/0x672 [ 1739.325714] ? idr_get_free+0xf70/0xf70 [ 1739.329674] ? _raw_spin_unlock_irq+0x27/0x80 [ 1739.334156] ? _raw_spin_unlock_irq+0x27/0x80 [ 1739.338647] oom_kill_process.cold.27+0x10/0x903 [ 1739.343389] ? _raw_spin_unlock_irq+0x27/0x80 [ 1739.347917] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1739.352502] ? oom_evaluate_task+0x540/0x540 [ 1739.356966] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1739.362513] ? cgroup_procs_next+0x70/0x70 [ 1739.366745] ? _raw_spin_unlock_irq+0x60/0x80 [ 1739.371235] ? oom_badness+0xaa0/0xaa0 [ 1739.375109] ? mem_cgroup_scan_tasks+0x1c3/0x1e0 [ 1739.379854] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1739.385381] ? mem_cgroup_iter_break+0x30/0x30 [ 1739.389957] ? cgroup_file_notify+0x226/0x2f0 [ 1739.394442] out_of_memory+0xa84/0x1430 [ 1739.398403] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1739.402974] ? kasan_check_read+0x11/0x20 [ 1739.407110] ? oom_killer_disable+0x3a0/0x3a0 [ 1739.411603] mem_cgroup_out_of_memory+0x15e/0x210 [ 1739.416435] ? memory_oom_group_write+0x160/0x160 [ 1739.421353] ? memcg_kmem_charge_memcg+0x7c/0x120 [ 1739.426293] ? page_counter_try_charge+0x1c1/0x220 [ 1739.431235] try_charge+0xda9/0x1700 [ 1739.434954] ? mem_cgroup_from_task+0x1f0/0x1f0 [ 1739.439610] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1739.444523] ? kasan_check_read+0x11/0x20 [ 1739.448658] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1739.453922] ? rcu_softirq_qs+0x20/0x20 [ 1739.457889] ? get_mem_cgroup_from_mm.part.62+0x221/0x880 [ 1739.463433] ? __kernel_text_address+0xd/0x40 [ 1739.467923] ? lock_page_memcg+0x350/0x350 [ 1739.472146] ? lock_acquire+0x1ed/0x520 [ 1739.476107] ? mem_cgroup_oom_control_write+0x100/0x100 [ 1739.481458] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1739.486985] ? check_preemption_disabled+0x48/0x280 [ 1739.491994] memcg_kmem_charge_memcg+0x7c/0x120 [ 1739.496647] ? memcg_kmem_put_cache+0xb0/0xb0 [ 1739.501127] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1739.506479] memcg_kmem_charge+0x149/0x350 [ 1739.510704] __alloc_pages_nodemask+0x75e/0xea0 [ 1739.515368] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1739.520641] ? lock_downgrade+0x900/0x900 [ 1739.524792] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 1739.529805] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1739.535334] ? check_preemption_disabled+0x48/0x280 [ 1739.540346] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1739.545872] ? rcu_pm_notify+0xc0/0xc0 [ 1739.549767] ? copy_process+0x2026/0x87a0 [ 1739.553905] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1739.558917] ? kmem_cache_alloc_node+0x349/0x730 [ 1739.563664] copy_process+0xa09/0x87a0 [ 1739.567547] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1739.573070] ? __lock_acquire+0x62f/0x4c20 [ 1739.577313] ? find_held_lock+0x36/0x1c0 [ 1739.581370] ? __cleanup_sighand+0x70/0x70 [ 1739.585623] ? mark_held_locks+0x130/0x130 [ 1739.589847] ? print_usage_bug+0xc0/0xc0 [ 1739.593908] ? mark_held_locks+0x130/0x130 [ 1739.598131] ? rcu_preempt_deferred_qs_irqrestore+0x8a5/0x1000 [ 1739.604175] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1739.609284] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1739.614376] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1739.618945] ? trace_hardirqs_on+0xbd/0x310 [ 1739.623252] ? kasan_check_read+0x11/0x20 [ 1739.627393] ? __lock_acquire+0x62f/0x4c20 [ 1739.631625] ? zap_class+0x640/0x640 [ 1739.635353] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1739.640882] ? check_preemption_disabled+0x48/0x280 [ 1739.645892] ? mark_held_locks+0x130/0x130 [ 1739.650113] ? print_usage_bug+0xc0/0xc0 [ 1739.654168] ? find_held_lock+0x36/0x1c0 [ 1739.658226] ? print_usage_bug+0xc0/0xc0 [ 1739.662273] ? __lock_acquire+0x62f/0x4c20 [ 1739.666495] ? lock_downgrade+0x900/0x900 [ 1739.670636] ? check_preemption_disabled+0x48/0x280 [ 1739.675640] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1739.681171] ? check_preemption_disabled+0x48/0x280 [ 1739.686209] ? print_usage_bug+0xc0/0xc0 [ 1739.690287] ? __lock_acquire+0x62f/0x4c20 [ 1739.694515] ? print_usage_bug+0xc0/0xc0 [ 1739.698586] ? __lock_acquire+0x62f/0x4c20 [ 1739.702822] ? rcu_read_unlock+0x16/0x60 [ 1739.706889] ? mark_held_locks+0x130/0x130 [ 1739.711116] ? mark_held_locks+0x130/0x130 [ 1739.715337] ? rcu_read_unlock+0x33/0x60 [ 1739.719387] ? find_held_lock+0x36/0x1c0 [ 1739.723443] ? zap_class+0x640/0x640 [ 1739.727145] ? delayacct_end+0x25/0x100 [ 1739.731103] ? lock_downgrade+0x900/0x900 [ 1739.735238] ? ktime_get+0x332/0x400 [ 1739.738960] ? print_usage_bug+0xc0/0xc0 [ 1739.743003] ? zap_class+0x640/0x640 [ 1739.746712] ? delayacct_end+0xc5/0x100 [ 1739.750678] ? zap_class+0x640/0x640 [ 1739.754378] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1739.759520] ? __lock_acquire+0x62f/0x4c20 [ 1739.763752] ? find_held_lock+0x36/0x1c0 [ 1739.767805] ? mark_held_locks+0x130/0x130 [ 1739.772133] ? _raw_spin_unlock_irq+0x27/0x80 [ 1739.776618] ? _raw_spin_unlock_irq+0x27/0x80 [ 1739.781109] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1739.785677] ? trace_hardirqs_on+0xbd/0x310 [ 1739.789987] ? kasan_check_read+0x11/0x20 [ 1739.794119] ? psi_memstall_leave+0x202/0x260 [ 1739.798605] ? trace_hardirqs_off_caller+0x310/0x310 [ 1739.803698] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1739.809557] ? check_preemption_disabled+0x48/0x280 [ 1739.814566] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1739.820088] ? rcu_pm_notify+0xc0/0xc0 [ 1739.823966] ? zap_class+0x640/0x640 [ 1739.827667] ? cgroup_file_notify+0x226/0x2f0 [ 1739.832152] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1739.837252] _do_fork+0x1cb/0x11d0 [ 1739.840784] ? fork_idle+0x1d0/0x1d0 [ 1739.844491] ? percpu_ref_put_many+0x11c/0x260 [ 1739.849079] ? lock_downgrade+0x900/0x900 [ 1739.853216] ? check_preemption_disabled+0x48/0x280 [ 1739.858219] ? kasan_check_read+0x11/0x20 [ 1739.862354] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1739.867626] ? rcu_softirq_qs+0x20/0x20 [ 1739.871612] ? check_preemption_disabled+0x48/0x280 [ 1739.876622] ? do_syscall_64+0x9a/0x820 [ 1739.880589] ? do_syscall_64+0x9a/0x820 [ 1739.884561] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1739.889154] ? trace_hardirqs_on+0xbd/0x310 [ 1739.893471] ? trace_hardirqs_on+0x310/0x310 [ 1739.897867] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1739.903214] ? trace_hardirqs_off_caller+0x310/0x310 [ 1739.908306] __x64_sys_clone+0xbf/0x150 [ 1739.912269] do_syscall_64+0x1b9/0x820 [ 1739.916144] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1739.921507] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1739.926422] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1739.931253] ? trace_hardirqs_on_caller+0x310/0x310 [ 1739.936273] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1739.941286] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1739.946117] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1739.951288] RIP: 0033:0x45a049 [ 1739.954568] Code: ff 48 85 f6 0f 84 27 8a fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 89 fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 1739.973568] RSP: 002b:00007ffc9ac45b18 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 1739.981263] RAX: ffffffffffffffda RBX: 00007f2488aeb700 RCX: 000000000045a049 [ 1739.988528] RDX: 00007f2488aeb9d0 RSI: 00007f2488aeadb0 RDI: 00000000003d0f00 [ 1739.995790] RBP: 00007ffc9ac45d20 R08: 00007f2488aeb700 R09: 00007f2488aeb700 [ 1740.003059] R10: 00007f2488aeb9d0 R11: 0000000000000202 R12: 0000000000000000 [ 1740.010317] R13: 00007ffc9ac45bcf R14: 00007f2488aeb9c0 R15: 000000000072c04c [ 1740.018756] Task in /syz4 killed as a result of limit of /syz4 [ 1740.024772] memory: usage 307184kB, limit 307200kB, failcnt 562 [ 1740.030930] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1740.037746] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1740.043876] Memory cgroup stats for /syz4: cache:260KB rss:275532KB rss_huge:264192KB shmem:32KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:92KB active_anon:275472KB inactive_file:0KB active_file:0KB unevictable:4KB [ 1740.065127] Memory cgroup out of memory: Kill process 17295 (syz-executor4) score 1103 or sacrifice child [ 1740.074927] Killed process 17295 (syz-executor4) total-vm:70340kB, anon-rss:2192kB, file-rss:32768kB, shmem-rss:0kB [ 1740.087423] oom_reaper: reaped process 17295 (syz-executor4), now anon-rss:0kB, file-rss:32768kB, shmem-rss:0kB 03:53:21 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:21 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfffffff5, 0x0, 0x0, 0x0) 03:53:21 executing program 1: open(&(0x7f0000000000)='./bus\x00', 0x47b, 0x2000000040) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:mount_exec_t:s0\x00', 0x22, 0x0) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 03:53:21 executing program 0: clock_getres(0x800004, 0x0) 03:53:21 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="240000001000626f02000c000100e1db22518a85a8c60000000000000000000000000000"], 0x24}}, 0x0) 03:53:21 executing program 4: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r0, 0x4042000) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000340)="11", 0x1, r0) 03:53:21 executing program 1: open(&(0x7f0000000000)='./bus\x00', 0x47b, 0x2000000040) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:mount_exec_t:s0\x00', 0x22, 0x0) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 03:53:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r1, 0x4042000) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f00000000c0)="11", 0x1, r1) 03:53:21 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2b48, 0x0, 0x0, 0x0) [ 1741.243124] netlink: 16 bytes leftover after parsing attributes in process `syz-executor5'. 03:53:21 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x20000000000002b0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000100), 0x2000000000000314, 0x10400003) [ 1741.285990] netlink: 16 bytes leftover after parsing attributes in process `syz-executor5'. 03:53:21 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:21 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="240000000c0607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 03:53:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x20, 0x10, 0xc362e63b3f31ba5f}, 0x20}}, 0x0) 03:53:22 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x48, 0x0, 0x0, 0x0) 03:53:22 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='personality\x00') readv(r0, &(0x7f0000f46000), 0x1000000000000106) [ 1741.444276] netlink: 'syz-executor5': attribute type 1 has an invalid length. 03:53:22 executing program 1: open(&(0x7f0000000000)='./bus\x00', 0x47b, 0x2000000040) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000100)='system_u:object_r:mount_exec_t:s0\x00', 0x22, 0x0) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 03:53:22 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:22 executing program 0: [ 1741.490960] netlink: 'syz-executor5': attribute type 1 has an invalid length. 03:53:22 executing program 1: open(&(0x7f0000000000)='./bus\x00', 0x47b, 0x2000000040) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000100)='system_u:object_r:mount_exec_t:s0\x00', 0x22, 0x0) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 03:53:22 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x0, 0x0) 03:53:22 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:22 executing program 5: 03:53:22 executing program 0: 03:53:22 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4244000000000000, 0x0, 0x0, 0x0) 03:53:22 executing program 4: 03:53:22 executing program 5: 03:53:22 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:22 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x0, 0x0) 03:53:22 executing program 4: 03:53:22 executing program 0: 03:53:22 executing program 1: open(&(0x7f0000000000)='./bus\x00', 0x47b, 0x2000000040) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 03:53:22 executing program 5: 03:53:22 executing program 4: 03:53:22 executing program 1: open(&(0x7f0000000000)='./bus\x00', 0x47b, 0x2000000040) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 03:53:22 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:22 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7, 0x0, 0x0, 0x0) 03:53:22 executing program 0: 03:53:22 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:22 executing program 5: 03:53:22 executing program 1: open(&(0x7f0000000000)='./bus\x00', 0x47b, 0x2000000040) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 03:53:22 executing program 4: 03:53:22 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x324}, 0x14}}, 0x0) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000240)=""/164, 0xa4}, {&(0x7f00000016c0)=""/4096, 0x1000}], 0x2}, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)={0x14, 0x42, 0x105}, 0x14}}, 0x0) 03:53:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000001080)={0x2, 0x4e20, @local}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000002c0)=0xc0000619, 0x4) sendto$inet(r0, &(0x7f0000000080)="95", 0x1, 0x0, 0x0, 0x0) shutdown(r0, 0x1) 03:53:22 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xffffff97, 0x0, 0x0, 0x0) 03:53:22 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x1b) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, 0x0, 0x0, 0x0) 03:53:22 executing program 4: 03:53:22 executing program 5: 03:53:22 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x1b) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, 0x0, 0x0, 0x0) [ 1742.163716] selinux_nlmsg_perm: 1108 callbacks suppressed [ 1742.163731] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32611 comm=syz-executor0 [ 1742.173362] syz-executor1 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null), order=3, oom_score_adj=0 03:53:22 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x20000000, 0x0, 0x0, 0x0) 03:53:22 executing program 4: [ 1742.245357] syz-executor1 cpuset=syz1 mems_allowed=0 [ 1742.284236] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32611 comm=syz-executor0 [ 1742.305468] CPU: 1 PID: 32606 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #151 [ 1742.312875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1742.322240] Call Trace: [ 1742.324841] dump_stack+0x244/0x39d [ 1742.328482] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1742.333705] dump_header+0x27b/0xf72 [ 1742.337446] ? mark_held_locks+0x130/0x130 [ 1742.341695] ? pagefault_out_of_memory+0x197/0x197 [ 1742.346627] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1742.352165] ? check_preemption_disabled+0x48/0x280 [ 1742.357205] ? zap_class+0x640/0x640 [ 1742.360920] ? __lock_is_held+0xb5/0x140 [ 1742.364981] ? zap_class+0x640/0x640 [ 1742.368698] ? print_usage_bug+0xc0/0xc0 [ 1742.372759] ? find_held_lock+0x36/0x1c0 [ 1742.376811] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1742.382350] ? find_held_lock+0x36/0x1c0 [ 1742.386407] ? mark_held_locks+0xc7/0x130 [ 1742.390542] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1742.395632] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1742.400719] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1742.405287] ? trace_hardirqs_on+0xbd/0x310 [ 1742.409593] ? kasan_check_read+0x11/0x20 [ 1742.413726] ? ___ratelimit+0x3b4/0x672 [ 1742.417690] ? trace_hardirqs_off_caller+0x310/0x310 [ 1742.422824] ? trace_hardirqs_on+0x310/0x310 [ 1742.427254] ? lock_downgrade+0x900/0x900 [ 1742.431393] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1742.436504] ? ___ratelimit+0x3b9/0x672 [ 1742.440492] ? idr_get_free+0xf70/0xf70 [ 1742.444464] ? _raw_spin_unlock_irq+0x27/0x80 [ 1742.449079] ? _raw_spin_unlock_irq+0x27/0x80 [ 1742.453565] oom_kill_process.cold.27+0x10/0x903 [ 1742.458312] ? _raw_spin_unlock_irq+0x27/0x80 [ 1742.462796] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1742.467367] ? oom_evaluate_task+0x540/0x540 [ 1742.471763] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1742.477286] ? cgroup_procs_next+0x70/0x70 [ 1742.481507] ? _raw_spin_unlock_irq+0x60/0x80 [ 1742.485992] ? oom_badness+0xaa0/0xaa0 [ 1742.489868] ? mem_cgroup_scan_tasks+0x1c3/0x1e0 [ 1742.494612] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1742.500137] ? mem_cgroup_iter_break+0x30/0x30 [ 1742.504726] ? cgroup_file_notify+0x226/0x2f0 [ 1742.509224] out_of_memory+0xa84/0x1430 [ 1742.513199] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1742.517873] ? kasan_check_read+0x11/0x20 [ 1742.522009] ? oom_killer_disable+0x3a0/0x3a0 [ 1742.526506] mem_cgroup_out_of_memory+0x15e/0x210 [ 1742.531338] ? memory_oom_group_write+0x160/0x160 [ 1742.536168] ? memcg_kmem_charge_memcg+0x7c/0x120 [ 1742.541032] ? page_counter_try_charge+0x1c1/0x220 [ 1742.545960] try_charge+0xda9/0x1700 [ 1742.549677] ? mem_cgroup_from_task+0x1f0/0x1f0 [ 1742.554333] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1742.559272] ? kasan_check_read+0x11/0x20 [ 1742.563512] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1742.568784] ? rcu_softirq_qs+0x20/0x20 [ 1742.572772] ? get_mem_cgroup_from_mm.part.62+0x221/0x880 [ 1742.578296] ? __kernel_text_address+0xd/0x40 [ 1742.582778] ? lock_page_memcg+0x350/0x350 [ 1742.587022] ? lock_acquire+0x1ed/0x520 [ 1742.590999] ? mem_cgroup_oom_control_write+0x100/0x100 [ 1742.596374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1742.601900] ? check_preemption_disabled+0x48/0x280 [ 1742.606910] memcg_kmem_charge_memcg+0x7c/0x120 [ 1742.611580] ? memcg_kmem_put_cache+0xb0/0xb0 [ 1742.616079] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1742.621460] memcg_kmem_charge+0x149/0x350 [ 1742.625700] __alloc_pages_nodemask+0x75e/0xea0 [ 1742.630360] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1742.635626] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 1742.640655] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1742.646188] ? check_preemption_disabled+0x48/0x280 [ 1742.651198] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1742.656720] ? rcu_pm_notify+0xc0/0xc0 [ 1742.660601] ? copy_process+0x2026/0x87a0 [ 1742.664757] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1742.669860] ? kmem_cache_alloc_node+0x349/0x730 [ 1742.674601] ? check_preemption_disabled+0x48/0x280 [ 1742.679605] copy_process+0xa09/0x87a0 [ 1742.683479] ? rcu_softirq_qs+0x20/0x20 [ 1742.687444] ? mem_cgroup_hierarchy_write+0x230/0x230 [ 1742.692637] ? __unlock_page_memcg+0x70/0x100 [ 1742.697124] ? __lock_acquire+0x62f/0x4c20 [ 1742.701349] ? __cleanup_sighand+0x70/0x70 [ 1742.705573] ? mark_held_locks+0x130/0x130 [ 1742.709794] ? trace_hardirqs_on+0xbd/0x310 [ 1742.714100] ? kasan_check_read+0x11/0x20 [ 1742.718251] ? finish_task_switch+0x1f4/0x910 [ 1742.722750] ? trace_hardirqs_off_caller+0x310/0x310 [ 1742.727930] ? mark_held_locks+0x130/0x130 [ 1742.732166] ? zap_class+0x640/0x640 [ 1742.735876] ? lock_acquire+0x1ed/0x520 [ 1742.739836] ? alloc_set_pte+0x1447/0x1f40 [ 1742.744059] ? kasan_check_read+0x11/0x20 [ 1742.748207] ? do_raw_spin_lock+0x14f/0x350 [ 1742.752517] ? rwlock_bug.part.2+0x90/0x90 [ 1742.756751] ? __lock_is_held+0xb5/0x140 [ 1742.760816] ? alloc_set_pte+0xdee/0x1f40 [ 1742.764957] ? zap_class+0x640/0x640 [ 1742.768667] ? reacquire_held_locks+0x137/0x510 [ 1742.773346] ? alloc_set_pte+0x1447/0x1f40 [ 1742.777579] ? find_held_lock+0x13f/0x1c0 [ 1742.781739] ? print_usage_bug+0xc0/0xc0 [ 1742.785799] ? lock_downgrade+0x900/0x900 [ 1742.789943] ? check_preemption_disabled+0x48/0x280 [ 1742.794955] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1742.799872] ? kasan_check_read+0x11/0x20 [ 1742.804006] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1742.809270] ? rcu_softirq_qs+0x20/0x20 [ 1742.813338] ? __lock_acquire+0x62f/0x4c20 [ 1742.817566] ? filemap_map_pages+0xd92/0x1a20 [ 1742.822057] ? mark_held_locks+0x130/0x130 [ 1742.826298] ? lock_downgrade+0x900/0x900 [ 1742.830454] ? do_raw_spin_trylock+0x270/0x270 [ 1742.835027] ? kasan_check_read+0x11/0x20 [ 1742.839160] ? print_usage_bug+0xc0/0xc0 [ 1742.843209] ? do_raw_spin_trylock+0x270/0x270 [ 1742.847793] ? print_usage_bug+0xc0/0xc0 [ 1742.851870] ? print_usage_bug+0xc0/0xc0 [ 1742.855918] ? zap_class+0x640/0x640 [ 1742.859627] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 1742.864725] ? futex_wake+0x304/0x760 [ 1742.868528] ? __lock_acquire+0x62f/0x4c20 [ 1742.872750] ? find_held_lock+0x36/0x1c0 [ 1742.876806] ? mark_held_locks+0x130/0x130 [ 1742.881027] ? ___perf_sw_event+0x51f/0x7c0 [ 1742.885332] ? lock_downgrade+0x900/0x900 [ 1742.889480] ? check_preemption_disabled+0x48/0x280 [ 1742.894494] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1742.899428] ? kasan_check_read+0x11/0x20 [ 1742.903570] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1742.908831] ? rcu_softirq_qs+0x20/0x20 [ 1742.912798] ? __asan_poison_stack_memory+0x37/0x40 [ 1742.917810] ? ___perf_sw_event+0x558/0x7c0 [ 1742.922132] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1742.926973] ? zap_class+0x640/0x640 [ 1742.930687] ? zap_class+0x640/0x640 [ 1742.934390] ? zap_class+0x640/0x640 [ 1742.938096] ? find_held_lock+0x36/0x1c0 [ 1742.942155] _do_fork+0x1cb/0x11d0 [ 1742.945686] ? fork_idle+0x1d0/0x1d0 [ 1742.949385] ? kasan_check_read+0x11/0x20 [ 1742.953527] ? kasan_check_read+0x11/0x20 [ 1742.957661] ? _copy_to_user+0xc8/0x110 [ 1742.961625] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1742.967156] ? put_timespec64+0x10f/0x1b0 [ 1742.971292] ? nsecs_to_jiffies+0x30/0x30 [ 1742.975427] ? do_syscall_64+0x9a/0x820 [ 1742.979389] ? do_syscall_64+0x9a/0x820 [ 1742.983373] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1742.987954] ? trace_hardirqs_on+0xbd/0x310 [ 1742.992268] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1742.997801] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1743.003159] ? trace_hardirqs_off_caller+0x310/0x310 [ 1743.008251] __x64_sys_clone+0xbf/0x150 [ 1743.012213] do_syscall_64+0x1b9/0x820 [ 1743.016089] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1743.021461] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1743.026385] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1743.031218] ? trace_hardirqs_on_caller+0x310/0x310 [ 1743.036235] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1743.041275] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1743.046300] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1743.051169] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1743.056344] RIP: 0033:0x457679 [ 1743.059538] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1743.078424] RSP: 002b:00007f098c899c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1743.086121] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457679 [ 1743.093374] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000002102001ffe [ 1743.100631] RBP: 000000000072bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 1743.107885] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f098c89a6d4 [ 1743.115154] R13: 00000000004bdbdd R14: 00000000004cd580 R15: 00000000ffffffff [ 1743.124927] Task in /syz1 killed as a result of limit of /syz1 [ 1743.130947] memory: usage 307200kB, limit 307200kB, failcnt 1622 [ 1743.137654] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1743.145018] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1743.151234] Memory cgroup stats for /syz1: cache:108KB rss:271152KB rss_huge:256000KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:12KB active_anon:271328KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1743.172359] Memory cgroup out of memory: Kill process 22941 (syz-executor1) score 1106 or sacrifice child [ 1743.182775] Killed process 22941 (syz-executor1) total-vm:70340kB, anon-rss:2192kB, file-rss:33628kB, shmem-rss:0kB [ 1743.194711] oom_reaper: reaped process 22941 (syz-executor1), now anon-rss:0kB, file-rss:32796kB, shmem-rss:0kB [ 1743.195550] syz-executor1 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null), order=3, oom_score_adj=0 [ 1743.218066] syz-executor1 cpuset=syz1 mems_allowed=0 [ 1743.223189] CPU: 0 PID: 32598 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #151 [ 1743.230531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1743.239872] Call Trace: [ 1743.242461] dump_stack+0x244/0x39d [ 1743.246076] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1743.251262] dump_header+0x27b/0xf72 [ 1743.254966] ? mark_held_locks+0x130/0x130 [ 1743.259187] ? pagefault_out_of_memory+0x197/0x197 [ 1743.264103] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1743.269627] ? check_preemption_disabled+0x48/0x280 [ 1743.274634] ? zap_class+0x640/0x640 [ 1743.278329] ? __lock_is_held+0xb5/0x140 [ 1743.282418] ? zap_class+0x640/0x640 [ 1743.286132] ? print_usage_bug+0xc0/0xc0 [ 1743.290180] ? find_held_lock+0x36/0x1c0 [ 1743.294231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1743.299753] ? find_held_lock+0x36/0x1c0 [ 1743.303804] ? mark_held_locks+0xc7/0x130 [ 1743.307952] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1743.313050] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1743.318138] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1743.322705] ? trace_hardirqs_on+0xbd/0x310 [ 1743.327010] ? kasan_check_read+0x11/0x20 [ 1743.331141] ? ___ratelimit+0x3b4/0x672 [ 1743.335100] ? trace_hardirqs_off_caller+0x310/0x310 [ 1743.340193] ? trace_hardirqs_on+0x310/0x310 [ 1743.344587] ? lock_downgrade+0x900/0x900 [ 1743.348732] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1743.353822] ? ___ratelimit+0x3b9/0x672 [ 1743.357790] ? idr_get_free+0xf70/0xf70 [ 1743.361745] ? _raw_spin_unlock_irq+0x27/0x80 [ 1743.366222] ? _raw_spin_unlock_irq+0x27/0x80 [ 1743.370708] oom_kill_process.cold.27+0x10/0x903 [ 1743.375447] ? _raw_spin_unlock_irq+0x27/0x80 [ 1743.379934] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1743.384503] ? oom_evaluate_task+0x540/0x540 [ 1743.388907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1743.394449] ? cgroup_procs_next+0x70/0x70 [ 1743.398671] ? _raw_spin_unlock_irq+0x60/0x80 [ 1743.403166] ? oom_badness+0xaa0/0xaa0 [ 1743.407041] ? mem_cgroup_scan_tasks+0x1c3/0x1e0 [ 1743.411791] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1743.417324] ? mem_cgroup_iter_break+0x30/0x30 [ 1743.421933] ? cgroup_file_notify+0x226/0x2f0 [ 1743.426449] out_of_memory+0xa84/0x1430 [ 1743.430412] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1743.434997] ? kasan_check_read+0x11/0x20 [ 1743.439146] ? oom_killer_disable+0x3a0/0x3a0 [ 1743.443733] mem_cgroup_out_of_memory+0x15e/0x210 [ 1743.448560] ? memory_oom_group_write+0x160/0x160 [ 1743.453390] ? memcg_kmem_charge_memcg+0x7c/0x120 [ 1743.458220] ? page_counter_try_charge+0x1c1/0x220 [ 1743.463139] try_charge+0xda9/0x1700 [ 1743.466845] ? mem_cgroup_from_task+0x1f0/0x1f0 [ 1743.471504] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1743.476421] ? kasan_check_read+0x11/0x20 [ 1743.480552] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1743.485825] ? rcu_softirq_qs+0x20/0x20 [ 1743.489816] ? get_mem_cgroup_from_mm.part.62+0x221/0x880 [ 1743.495356] ? __kernel_text_address+0xd/0x40 [ 1743.499837] ? lock_page_memcg+0x350/0x350 [ 1743.504084] ? lock_acquire+0x1ed/0x520 [ 1743.508048] ? mem_cgroup_oom_control_write+0x100/0x100 [ 1743.513396] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1743.518924] ? check_preemption_disabled+0x48/0x280 [ 1743.523943] memcg_kmem_charge_memcg+0x7c/0x120 [ 1743.528605] ? memcg_kmem_put_cache+0xb0/0xb0 [ 1743.533086] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1743.538443] memcg_kmem_charge+0x149/0x350 [ 1743.542669] __alloc_pages_nodemask+0x75e/0xea0 [ 1743.547339] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1743.552616] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 1743.557618] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1743.563171] ? check_preemption_disabled+0x48/0x280 [ 1743.568192] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1743.573726] ? rcu_pm_notify+0xc0/0xc0 [ 1743.577607] ? copy_process+0x2026/0x87a0 [ 1743.581743] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1743.586744] ? kmem_cache_alloc_node+0x349/0x730 [ 1743.591495] copy_process+0xa09/0x87a0 [ 1743.595384] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1743.600924] ? __lock_acquire+0x62f/0x4c20 [ 1743.605159] ? find_held_lock+0x36/0x1c0 [ 1743.609219] ? __cleanup_sighand+0x70/0x70 [ 1743.613442] ? mark_held_locks+0x130/0x130 [ 1743.617659] ? print_usage_bug+0xc0/0xc0 [ 1743.621704] ? mark_held_locks+0x130/0x130 [ 1743.625926] ? rcu_preempt_deferred_qs_irqrestore+0x8a5/0x1000 [ 1743.631899] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1743.636996] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1743.642090] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1743.646770] ? trace_hardirqs_on+0xbd/0x310 [ 1743.651081] ? kasan_check_read+0x11/0x20 [ 1743.655217] ? __lock_acquire+0x62f/0x4c20 [ 1743.659439] ? zap_class+0x640/0x640 [ 1743.663143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1743.668666] ? check_preemption_disabled+0x48/0x280 [ 1743.673674] ? mark_held_locks+0x130/0x130 [ 1743.677988] ? print_usage_bug+0xc0/0xc0 [ 1743.682041] ? find_held_lock+0x36/0x1c0 [ 1743.686089] ? print_usage_bug+0xc0/0xc0 [ 1743.690137] ? __lock_acquire+0x62f/0x4c20 [ 1743.694366] ? lock_downgrade+0x900/0x900 [ 1743.698502] ? check_preemption_disabled+0x48/0x280 [ 1743.703526] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1743.709074] ? check_preemption_disabled+0x48/0x280 [ 1743.714102] ? print_usage_bug+0xc0/0xc0 [ 1743.718150] ? __lock_acquire+0x62f/0x4c20 [ 1743.722371] ? print_usage_bug+0xc0/0xc0 [ 1743.726425] ? __lock_acquire+0x62f/0x4c20 [ 1743.730647] ? rcu_read_unlock+0x16/0x60 [ 1743.734702] ? mark_held_locks+0x130/0x130 [ 1743.738933] ? mark_held_locks+0x130/0x130 [ 1743.743157] ? rcu_read_unlock+0x33/0x60 [ 1743.747203] ? find_held_lock+0x36/0x1c0 [ 1743.751248] ? zap_class+0x640/0x640 [ 1743.754961] ? delayacct_end+0x25/0x100 [ 1743.758923] ? lock_downgrade+0x900/0x900 [ 1743.763059] ? ktime_get+0x332/0x400 [ 1743.766762] ? print_usage_bug+0xc0/0xc0 [ 1743.770808] ? zap_class+0x640/0x640 [ 1743.774512] ? delayacct_end+0xc5/0x100 [ 1743.778471] ? zap_class+0x640/0x640 [ 1743.782173] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1743.787265] ? __lock_acquire+0x62f/0x4c20 [ 1743.791488] ? find_held_lock+0x36/0x1c0 [ 1743.795541] ? mark_held_locks+0x130/0x130 [ 1743.799760] ? _raw_spin_unlock_irq+0x27/0x80 [ 1743.804242] ? _raw_spin_unlock_irq+0x27/0x80 [ 1743.808724] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1743.813295] ? trace_hardirqs_on+0xbd/0x310 [ 1743.817604] ? kasan_check_read+0x11/0x20 [ 1743.821743] ? psi_memstall_leave+0x202/0x260 [ 1743.826222] ? trace_hardirqs_off_caller+0x310/0x310 [ 1743.831314] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1743.836863] ? check_preemption_disabled+0x48/0x280 [ 1743.841890] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1743.847412] ? rcu_pm_notify+0xc0/0xc0 [ 1743.851315] ? zap_class+0x640/0x640 [ 1743.855016] ? cgroup_file_notify+0x226/0x2f0 [ 1743.859500] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1743.864591] _do_fork+0x1cb/0x11d0 [ 1743.868138] ? fork_idle+0x1d0/0x1d0 [ 1743.871842] ? percpu_ref_put_many+0x11c/0x260 [ 1743.876424] ? lock_downgrade+0x900/0x900 [ 1743.880558] ? check_preemption_disabled+0x48/0x280 [ 1743.885561] ? kasan_check_read+0x11/0x20 [ 1743.889694] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1743.895056] ? rcu_softirq_qs+0x20/0x20 [ 1743.899036] ? check_preemption_disabled+0x48/0x280 [ 1743.904042] ? do_syscall_64+0x9a/0x820 [ 1743.908001] ? do_syscall_64+0x9a/0x820 [ 1743.911960] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1743.916532] ? trace_hardirqs_on+0xbd/0x310 [ 1743.920840] ? trace_hardirqs_on+0x310/0x310 [ 1743.925241] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1743.930590] ? trace_hardirqs_off_caller+0x310/0x310 [ 1743.935681] __x64_sys_clone+0xbf/0x150 [ 1743.939643] do_syscall_64+0x1b9/0x820 [ 1743.943527] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1743.948878] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1743.953894] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1743.958731] ? trace_hardirqs_on_caller+0x310/0x310 [ 1743.963735] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1743.968836] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1743.973692] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1743.978878] RIP: 0033:0x45a049 [ 1743.982065] Code: ff 48 85 f6 0f 84 27 8a fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 89 fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 1744.001344] RSP: 002b:00007fff5bd1d7b8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 1744.009073] RAX: ffffffffffffffda RBX: 00007f098c879700 RCX: 000000000045a049 [ 1744.016335] RDX: 00007f098c8799d0 RSI: 00007f098c878db0 RDI: 00000000003d0f00 [ 1744.023590] RBP: 00007fff5bd1d9c0 R08: 00007f098c879700 R09: 00007f098c879700 [ 1744.030849] R10: 00007f098c8799d0 R11: 0000000000000202 R12: 0000000000000000 [ 1744.038371] R13: 00007fff5bd1d86f R14: 00007f098c8799c0 R15: 000000000072bfac [ 1744.047442] Task in /syz1 killed as a result of limit of /syz1 [ 1744.053476] memory: usage 304896kB, limit 307200kB, failcnt 1622 [ 1744.059669] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1744.066456] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 03:53:24 executing program 1: open(&(0x7f0000000000)='./bus\x00', 0x47b, 0x2000000040) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:mount_exec_t:s0\x00', 0x22, 0x0) execve(0x0, 0x0, 0x0) 03:53:24 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x5000000, 0x0) 03:53:24 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x1b) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, 0x0, 0x0, 0x0) 03:53:24 executing program 4: 03:53:24 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00004ca000)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c0000000007010000000000000000000000000008000100c1900000"], 0x1c}}, 0x0) 03:53:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) [ 1744.072585] Memory cgroup stats for /syz1: cache:108KB rss:269144KB rss_huge:253952KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:12KB active_anon:269180KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1744.093695] Memory cgroup out of memory: Kill process 22958 (syz-executor1) score 1106 or sacrifice child [ 1744.103546] Killed process 22958 (syz-executor1) total-vm:70340kB, anon-rss:2192kB, file-rss:33628kB, shmem-rss:0kB [ 1744.115561] oom_reaper: reaped process 22958 (syz-executor1), now anon-rss:0kB, file-rss:32796kB, shmem-rss:0kB 03:53:24 executing program 2: socket$inet6(0x10, 0x3, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:24 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x417e, 0x0, 0x0, 0x0, 0x8000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) write$cgroup_type(r2, &(0x7f0000000380)='threaded\x00', 0x9) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x200}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=r3, 0x4) close(r0) 03:53:24 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00004ca000)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c0000000007010000000000000000000000000008000100c1900000"], 0x1c}}, 0x0) [ 1744.217061] hfsplus: unable to find HFS+ superblock 03:53:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:24 executing program 2: socket$inet6(0x10, 0x3, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 1744.309168] hfsplus: unable to find HFS+ superblock 03:53:24 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xe, 0x10000000004, 0x4, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000500)="ad", 0x0}, 0x20) 03:53:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:25 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x5354, 0x0) 03:53:25 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00004ca000)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c0000000007010000000000000000000000000008000100c1900000"], 0x1c}}, 0x0) 03:53:25 executing program 2: socket$inet6(0x10, 0x3, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:25 executing program 1: getpid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x5c, 0x0, &(0x7f0000000380)="b90703e6680d698cb89e40f086ddd5dc57ee41dea43e56a377fb8a977c3f1d170004e000d84648a2ac141411e0000001e1977d486a72d7363417ef6c9079a2ea1adc7b259747b34bd1d6e19e60597be8e1d504832c8182e40b3d72d6", 0x0, 0x100}, 0x28) 03:53:25 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00004ca000)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c0000000007010000000000000000000000000008000100c1900000"], 0x1c}}, 0x0) 03:53:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:25 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x2a14, 0x3}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r0, &(0x7f0000000040)="3ca28733afc65d9abb0353a08968591b5d2309828bb470f8b95f46addbae33264ef1afa241d01a27e6171f3776b9ee7726ef5f0a04a580517a7b9d", 0x0}, 0x18) 03:53:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="6d656d6f72792e63757272656e74005b1c94570758ad76e7cc1555f2f711b15ee81ae3116a0491f5c931477d627f4b6fd6d776dcd9f172ac64cdb6c3014c0456f535e68bcc406d7270a58f5bb7eaff1c7dc912393b95e0ac169c1011c63ddb7b228202dd4bdeab8838b4c23d41d94ed3c9e62a2d5e645c80f46ca0372db3429ce1e16008f359dc0a043326e68dfa89448d949dd746ab4db16f9d5087ccc068785f1939fd463d7e3f07e9568c796f6b37941aefff11d2c037dbcc35a2c8112a455ba81531fe4b6e015eef93e613f722e3054546f633d30f22120889b992342ad1fd19a9", 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x14, 0x4, 0x4000000004, 0x200001094, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0xa]}, 0x2c) 03:53:25 executing program 2: clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:25 executing program 5: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00004ca000)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c0000000007010000000000000000000000000008000100c1900000"], 0x1c}}, 0x0) 03:53:25 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, 0x0) 03:53:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000440)=""/199) 03:53:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:25 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00004ca000)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c0000000007010000000000000000000000000008000100c1900000"], 0x1c}}, 0x0) 03:53:25 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:53:25 executing program 2: clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:25 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x1f00, 0x0) 03:53:25 executing program 4: semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000000)=""/218) 03:53:26 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, 0x0, 0x0) 03:53:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:26 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) 03:53:26 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) 03:53:26 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x4c, 0x0) 03:53:26 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r1, 0x0, 0x2, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) getpid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x1400, 0x5000000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={0x0}}, 0x10) 03:53:26 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 03:53:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) [ 1745.615393] audit: type=1804 audit(2000001206.202:1425): pid=32756 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir507667177/syzkaller.kCigNe/1790/memory.events" dev="sda1" ino=16860 res=1 03:53:26 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00004ca000)}, 0x0) [ 1745.668155] hfsplus: unable to find HFS+ superblock [ 1745.783551] hfsplus: unable to find HFS+ superblock [ 1746.023437] audit: type=1804 audit(2000001206.613:1426): pid=32750 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir507667177/syzkaller.kCigNe/1790/memory.events" dev="sda1" ino=16860 res=1 [ 1746.085231] audit: type=1804 audit(2000001206.683:1427): pid=32756 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir507667177/syzkaller.kCigNe/1790/memory.events" dev="sda1" ino=16860 res=1 [ 1746.113166] audit: type=1800 audit(2000001206.683:1428): pid=32756 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor1" name="memory.events" dev="sda1" ino=16860 res=0 03:53:28 executing program 2: clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:28 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00004ca000)={&(0x7f0000000280)=ANY=[]}}, 0x0) 03:53:28 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x1f00000000000000, 0x0) 03:53:28 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r1, 0x0, 0x2, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) getpid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x1400, 0x5000000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={0x0}}, 0x10) 03:53:28 executing program 4: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000640)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200), 0xfc99}], 0x1}, 0x0) 03:53:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:29 executing program 4: r0 = inotify_init() r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000080)='./bus\x00', 0x8000000002fc) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) dup3(r3, r1, 0x0) 03:53:29 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00004ca000)={&(0x7f0000000280)=ANY=[@ANYBLOB]}}, 0x0) 03:53:29 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x7400000000000000, 0x0) 03:53:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) [ 1748.494586] audit: type=1804 audit(2000001209.084:1429): pid=316 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir507667177/syzkaller.kCigNe/1791/memory.events" dev="sda1" ino=16992 res=1 03:53:29 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) 03:53:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00004ca000)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c00000000070100000000000000"], 0xe}}, 0x0) 03:53:32 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x4d500000, 0x0) 03:53:32 executing program 2: socket$inet6(0x10, 0x0, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:32 executing program 4: socketpair$unix(0x1, 0x4000000000000002, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = memfd_create(&(0x7f0000000200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) read$FUSE(r2, &(0x7f00000005c0), 0x1000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) close(r1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 03:53:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r1, 0x0, 0x2, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) getpid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x1400, 0x5000000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={0x0}}, 0x10) 03:53:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00004ca000)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c0000000007010000000000000000000000000008"], 0x15}}, 0x0) 03:53:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:32 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x1f000000, 0x0) [ 1751.551740] audit: type=1804 audit(2000001212.145:1430): pid=355 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir507667177/syzkaller.kCigNe/1792/memory.events" dev="sda1" ino=17329 res=1 03:53:32 executing program 4: socket$inet6(0x10, 0x3, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) [ 1751.653961] hfsplus: unable to find HFS+ superblock 03:53:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00004ca000)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c0000000007010000000000000000000000000008"], 0x15}}, 0x0) [ 1751.750293] hfsplus: unable to find HFS+ superblock 03:53:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00004ca000)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c0000000007010000000000000000000000000008"], 0x15}}, 0x0) 03:53:32 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) 03:53:35 executing program 2: socket$inet6(0x10, 0x0, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:35 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00004ca000)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c0000000007010000000000000000000000000008000100c1"], 0x19}}, 0x0) 03:53:35 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x500, 0x0) 03:53:35 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(r1, 0x0, 0x2, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) getpid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x1400, 0x5000000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={0x0}}, 0x10) 03:53:35 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00004ca000)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c0000000007010000000000000000000000000008000100c1"], 0x19}}, 0x0) [ 1754.536023] hfsplus: unable to find HFS+ superblock 03:53:35 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) [ 1754.605649] hfsplus: unable to find HFS+ superblock [ 1754.617535] audit: type=1804 audit(2000001215.217:1431): pid=426 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir507667177/syzkaller.kCigNe/1793/memory.events" dev="sda1" ino=17386 res=1 03:53:35 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000580)=r0, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x1800000000000000, 0x5c, 0x0, &(0x7f0000000380)="b90703e6680d698cb89e40f086ddd5dc57ee41dea43e56a377fb8a977c3f1d170004e000d84648a2ac141411e0000001e1977d486a72d7363417ef6c9079a2ea1adc7b259747b34bd1d6e19e60597be8e1d504832c8182e40b3d72d6", 0x0, 0x100}, 0x28) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000080)={&(0x7f0000011080)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000011380)=[{&(0x7f0000011200)=""/100, 0x64}, {&(0x7f0000000280)=""/3, 0x3}, {&(0x7f00000000c0)=""/51, 0x33}], 0x3}, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000011440)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)='syzkaller\x00', 0xaf6, 0x73, &(0x7f0000000200)=""/115, 0x0, 0x0, [], r1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0xbcf2d42dbfc75542, &(0x7f00000000c0)}, 0x57) 03:53:35 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:35 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00004ca000)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c0000000007010000000000000000000000000008000100c1"], 0x19}}, 0x0) 03:53:35 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff8c, 0x0) 03:53:35 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:38 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_triestat\x00') sendfile(r0, r1, 0x0, 0x80000001) 03:53:38 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00004ca000)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c0000000007010000000000000000000000000008000100c19000"], 0x1b}}, 0x0) 03:53:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:38 executing program 2: socket$inet6(0x10, 0x0, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:38 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x4858000000000000, 0x0) 03:53:38 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0x6, @dev}, 0x10) 03:53:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:38 executing program 4: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 03:53:38 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00004ca000)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c0000000007010000000000000000000000000008000100c19000"], 0x1b}}, 0x0) 03:53:38 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x8000000000000000, 0x0) 03:53:38 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00004ca000)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c0000000007010000000000000000000000000008000100c19000"], 0x1b}}, 0x0) 03:53:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) 03:53:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:38 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x47b, 0x2000000040) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000240)='security.selinux\x00', 0x0, 0x0, 0x0) execve(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 03:53:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:41 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:41 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, 0x0, 0x0, 0x0) 03:53:41 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, 0x0, 0x0, 0x0) 03:53:41 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a0, 0x0) 03:53:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:41 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000, 0x0) 03:53:41 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:41 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x400000000000000, 0x0) 03:53:41 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, 0x0, 0x0, 0x0) 03:53:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:41 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, 0x0, 0x0, 0x0) 03:53:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:41 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xe000000000000, 0x0) 03:53:41 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:41 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, 0x0, 0x0, 0x0) 03:53:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:41 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:41 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2c, 0x0) 03:53:41 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) lgetxattr(0x0, 0x0, 0x0, 0x0) 03:53:41 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:41 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:53:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:41 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:42 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x5453, 0x0) 03:53:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:42 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:53:42 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:42 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:42 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:42 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:53:42 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:42 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x6000000000000000, 0x0) 03:53:42 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/4096, 0x1000) 03:53:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:42 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:42 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:53:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:42 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:42 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x40000000, 0x0) 03:53:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:42 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/4096, 0x1000) 03:53:42 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:53:42 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 1762.043636] hfsplus: unable to find HFS+ superblock 03:53:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01ab", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) [ 1762.105249] hfsplus: unable to find HFS+ superblock 03:53:42 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01ab", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:42 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:53:42 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x4800, 0x0) 03:53:42 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:53:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01ab", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:42 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 1762.266276] hfsplus: unable to find HFS+ superblock 03:53:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:42 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:53:42 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:42 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) [ 1762.340918] hfsplus: unable to find HFS+ superblock 03:53:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:43 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x6000, 0x0) 03:53:43 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f", 0x1c) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:43 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:53:43 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:53:43 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a90", 0x1e) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:43 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:43 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffa0008000, 0x0) 03:53:43 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:53:43 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a90", 0x1e) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:43 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2, 0x0) 03:53:43 executing program 4: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:53:43 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:53:43 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) [ 1762.761686] hfsplus: unable to find HFS+ superblock 03:53:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a90", 0x1e) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:43 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:53:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a9061", 0x1f) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:43 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:53:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a9061", 0x1f) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:43 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) [ 1763.017360] hfsplus: unable to find HFS+ superblock 03:53:44 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xe82, 0x0) 03:53:44 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:53:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a9061", 0x1f) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:44 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:44 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) [ 1763.657267] hfsplus: unable to find HFS+ superblock 03:53:44 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:53:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) [ 1763.700086] hfsplus: unable to find HFS+ superblock 03:53:44 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xedc0, 0x0) 03:53:44 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:53:44 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:53:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:44 executing program 1: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:53:44 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) [ 1763.982268] IPVS: ftp: loaded support on port[0] = 21 [ 1765.545330] bridge0: port 1(bridge_slave_0) entered blocking state [ 1765.551752] bridge0: port 1(bridge_slave_0) entered disabled state [ 1765.558884] device bridge_slave_0 entered promiscuous mode [ 1765.583399] device bridge_slave_1 left promiscuous mode [ 1765.589027] bridge0: port 2(bridge_slave_1) entered disabled state [ 1765.634223] device bridge_slave_0 left promiscuous mode [ 1765.639681] bridge0: port 1(bridge_slave_0) entered disabled state [ 1767.390353] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1767.457569] bond0 (unregistering): Released all slaves [ 1767.527121] bridge0: port 2(bridge_slave_1) entered blocking state [ 1767.534067] bridge0: port 2(bridge_slave_1) entered disabled state [ 1767.540989] device bridge_slave_1 entered promiscuous mode [ 1767.573213] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1767.602408] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1767.694235] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1767.740131] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1767.953249] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1767.960645] team0: Port device team_slave_0 added [ 1768.006374] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1768.013915] team0: Port device team_slave_1 added [ 1768.059150] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1768.108310] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1768.155281] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1768.162918] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1768.179643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1768.219107] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1768.226344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1768.243444] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1768.702673] bridge0: port 2(bridge_slave_1) entered blocking state [ 1768.709035] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1768.715709] bridge0: port 1(bridge_slave_0) entered blocking state [ 1768.722074] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1768.729670] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1769.601472] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1769.821900] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1769.915634] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1770.008374] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1770.014577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1770.022621] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1770.110752] 8021q: adding VLAN 0 to HW filter on device team0 03:53:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:54 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x48580000, 0x0) 03:53:54 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:53:54 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:54 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:53:54 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:53:54 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:53:54 executing program 5: 03:53:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:54 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:53:54 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f00000001c0)='./file0\x00') mount(0x0, &(0x7f0000000100)='.\x00', 0x0, 0x6000, 0x0) 03:53:54 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x10000000, 0x0) 03:53:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:54 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) [ 1773.942188] hfsplus: unable to find HFS+ superblock 03:53:54 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) [ 1774.021775] hfsplus: unable to find HFS+ superblock [ 1775.358173] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 03:53:57 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:53:57 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:57 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xa0008000, 0x0) 03:53:57 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:53:57 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f00000001c0)='./file0\x00') mount(0x0, &(0x7f0000000100)='.\x00', 0x0, 0x6000, 0x0) 03:53:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:53:57 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:53:57 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:53:57 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0) 03:53:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) [ 1776.904167] hfsplus: unable to find HFS+ superblock 03:53:57 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:53:57 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) [ 1776.990417] hfsplus: unable to find HFS+ superblock 03:54:00 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:54:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:54:00 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:54:00 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x4c000000, 0x0) 03:54:00 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:54:00 executing program 5: r0 = socket$packet(0x11, 0x800000003, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x18f) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000080), 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000240)) [ 1779.867449] hfsplus: unable to find HFS+ superblock 03:54:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:54:00 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:54:00 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:54:00 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 1779.959729] hfsplus: unable to find HFS+ superblock 03:54:00 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x74, 0x0) 03:54:00 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:54:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:54:00 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:54:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:54:00 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(0x0, 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:54:00 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xa00000000000000, 0x0) 03:54:02 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/4096, 0x1000) 03:54:02 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:54:02 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:54:03 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:54:03 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x6800, 0x0) 03:54:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:54:03 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) 03:54:03 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:54:03 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) getsockopt$sock_buf(r1, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) 03:54:03 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) getsockopt$sock_buf(r1, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) 03:54:03 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(0x0, 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:54:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:54:03 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x3bac51733b10d952) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x50, r0, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffcc, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = accept4(r1, &(0x7f00000001c0)=@nl, &(0x7f0000000040)=0x80, 0x800) setsockopt$inet6_tcp_TLS_RX(r2, 0x6, 0x2, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000400)=""/4096, 0xf769}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) 03:54:03 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x7400, 0x0) 03:54:03 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) getsockopt$sock_buf(r1, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) 03:54:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{0x0}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:54:06 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:54:06 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/4096, 0x1000) 03:54:06 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) getsockopt$sock_buf(r1, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) 03:54:06 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xd000000, 0x0) 03:54:06 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{0x0}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) [ 1786.192796] hfsplus: unable to find HFS+ superblock 03:54:06 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) 03:54:06 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000001380)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) 03:54:06 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) [ 1786.270237] hfsplus: unable to find HFS+ superblock 03:54:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{0x0}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:54:06 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) 03:54:06 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x3400, 0x0) 03:54:09 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:54:09 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r0, 0x205}], 0x2, 0x0, 0x0, 0x0) 03:54:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:54:09 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:09 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) 03:54:09 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x300, 0x0) [ 1789.247077] hfsplus: unable to find HFS+ superblock 03:54:09 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:54:09 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:09 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) 03:54:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:54:09 executing program 1: munmap(&(0x7f000000d000/0x3000)=nil, 0x3000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) syz_open_pts(r0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, 0x0, 0x0) [ 1789.341202] hfsplus: unable to find HFS+ superblock 03:54:10 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) getsockopt$sock_buf(r0, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) 03:54:10 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x482b, 0x0) 03:54:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:54:10 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:10 executing program 1: munmap(&(0x7f000000d000/0x3000)=nil, 0x3000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) syz_open_pts(r0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, 0x0, 0x0) 03:54:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06c", 0x8}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:54:10 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) getsockopt$sock_buf(r0, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) 03:54:12 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:54:12 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xd01000000000000, 0x0) 03:54:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06c", 0x8}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:54:12 executing program 1: munmap(&(0x7f000000d000/0x3000)=nil, 0x3000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) syz_open_pts(r0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, 0x0, 0x0) 03:54:12 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) getsockopt$sock_buf(r0, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) 03:54:12 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:13 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:13 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) getsockopt$sock_buf(r0, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) 03:54:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06c", 0x8}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:54:13 executing program 1: munmap(&(0x7f000000d000/0x3000)=nil, 0x3000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) syz_open_pts(r0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, 0x0, 0x0) 03:54:13 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x820e000000000000, 0x0) 03:54:13 executing program 1: munmap(&(0x7f000000d000/0x3000)=nil, 0x3000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) syz_open_pts(r0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:54:16 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:54:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e", 0xc}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:54:16 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:16 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) getsockopt$sock_buf(r0, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) 03:54:16 executing program 1: munmap(&(0x7f000000d000/0x3000)=nil, 0x3000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) syz_open_pts(r0, 0x0) 03:54:16 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x53540000, 0x0) 03:54:16 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) getsockopt$sock_buf(r0, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) 03:54:16 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:16 executing program 1: munmap(&(0x7f000000d000/0x3000)=nil, 0x3000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) 03:54:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e", 0xc}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:54:16 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x820e0000, 0x0) 03:54:16 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:19 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:54:19 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) getsockopt$sock_buf(r1, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) 03:54:19 executing program 1: munmap(&(0x7f000000d000/0x3000)=nil, 0x3000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) 03:54:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e", 0xc}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:54:19 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:19 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, 0x0) [ 1798.544489] hfsplus: unable to find HFS+ superblock 03:54:19 executing program 1: munmap(&(0x7f000000d000/0x3000)=nil, 0x3000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) 03:54:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3", 0xe}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:54:19 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:19 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) getsockopt$sock_buf(r1, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) [ 1798.630933] hfsplus: unable to find HFS+ superblock 03:54:19 executing program 1: munmap(&(0x7f000000d000/0x3000)=nil, 0x3000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) 03:54:19 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) getsockopt$sock_buf(r1, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) 03:54:22 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:54:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3", 0xe}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:54:22 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20000, 0x0) 03:54:22 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:22 executing program 1: munmap(&(0x7f000000d000/0x3000)=nil, 0x3000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) 03:54:22 executing program 5: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) getsockopt$sock_buf(r0, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) 03:54:22 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:22 executing program 5: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) getsockopt$sock_buf(r0, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) 03:54:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3", 0xe}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:54:22 executing program 1: munmap(&(0x7f000000d000/0x3000)=nil, 0x3000) 03:54:22 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:54:22 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x700, 0x0) 03:54:22 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:22 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000f00)=0x7a, 0x2ce) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x17) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001c00)=""/4096, 0x1000}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000900)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "ad262e2d1e0829bb1b890c4c36f342f4d8786d40ce1e2bc8789e96ef859eea93bcfacc0e96c911b64f25b696cf157a6b89fca8e97d7fb537c5bcf0a6b0e7d4f867f444a7b8f854d879843a6c874b1b736b"}, 0xc9) write$binfmt_elf64(r0, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], 0x302) [ 1801.794581] hfsplus: unable to find HFS+ superblock 03:54:22 executing program 5: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) getsockopt$sock_buf(r0, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) 03:54:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3", 0xf}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) [ 1801.872422] hfsplus: unable to find HFS+ superblock 03:54:22 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) getsockopt$sock_buf(r0, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) 03:54:22 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x4800000000000000, 0x0) 03:54:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3", 0xf}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:54:22 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3", 0xf}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:54:22 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) getsockopt$sock_buf(r0, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) 03:54:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:54:25 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x500, 0x2) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f00000000c0), &(0x7f0000000100)=0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) lstat(0x0, 0x0) getgid() ioprio_get$uid(0x3, 0x0) 03:54:25 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:25 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x500000000000000, 0x0) 03:54:25 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:54:25 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) getsockopt$sock_buf(r0, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) 03:54:25 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:54:25 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) getsockopt$sock_buf(r1, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) 03:54:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 03:54:25 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:25 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x500, 0x2) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f00000000c0), &(0x7f0000000100)=0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) lstat(0x0, 0x0) getgid() ioprio_get$uid(0x3, 0x0) 03:54:25 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) getsockopt$sock_buf(r1, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) 03:54:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 03:54:25 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000, 0x0) [ 1804.970083] hfsplus: unable to find HFS+ superblock 03:54:28 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:54:28 executing program 4: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 03:54:28 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) getsockopt$sock_buf(r1, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) 03:54:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@random={'user.', 'fd'}, &(0x7f0000000480)=""/234, 0xea) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) syz_open_procfs(0x0, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 03:54:28 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xfcfdffff, 0x0) 03:54:28 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000edfff0)={0x77359400}, 0x0, 0x0) r0 = getpid() socketpair$unix(0x1, 0x200000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f00005ebff8)=0x3f) fcntl$setsig(r1, 0xa, 0x12) fcntl$setownex(r1, 0xf, &(0x7f0000704000)={0x0, r0}) recvmsg(r2, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) dup2(r1, r2) tkill(r0, 0x15) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000000080), 0x0) 03:54:28 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x0, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) getsockopt$sock_buf(r1, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) 03:54:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 03:54:28 executing program 4: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:28 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x300000000000000, 0x0) 03:54:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80), 0x0, 0x0, 0x0) [ 1807.925726] syz-executor1 invoked oom-killer: gfp_mask=0x6200ca(GFP_HIGHUSER_MOVABLE), nodemask=(null), order=0, oom_score_adj=0 [ 1807.938024] syz-executor1 cpuset=syz1 mems_allowed=0 [ 1807.944897] CPU: 0 PID: 1680 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #151 [ 1807.952184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1807.961645] Call Trace: [ 1807.964243] dump_stack+0x244/0x39d [ 1807.968017] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1807.973211] ? mark_held_locks+0x130/0x130 [ 1807.977438] ? mark_held_locks+0x130/0x130 [ 1807.981669] dump_header+0x27b/0xf72 [ 1807.985396] ? pagefault_out_of_memory+0x197/0x197 [ 1807.990310] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1807.995836] ? check_preemption_disabled+0x48/0x280 [ 1808.000848] ? zap_class+0x640/0x640 [ 1808.004545] ? __lock_is_held+0xb5/0x140 [ 1808.008593] ? zap_class+0x640/0x640 [ 1808.012305] ? print_usage_bug+0xc0/0xc0 [ 1808.016354] ? find_held_lock+0x36/0x1c0 [ 1808.020404] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1808.025935] ? find_held_lock+0x36/0x1c0 [ 1808.029985] ? mark_held_locks+0xc7/0x130 [ 1808.034123] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1808.039222] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1808.044316] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1808.048910] ? trace_hardirqs_on+0xbd/0x310 [ 1808.053227] ? kasan_check_read+0x11/0x20 [ 1808.057365] ? ___ratelimit+0x3b4/0x672 [ 1808.061329] ? trace_hardirqs_off_caller+0x310/0x310 [ 1808.066424] ? trace_hardirqs_on+0x310/0x310 [ 1808.070826] ? lock_downgrade+0x900/0x900 [ 1808.074988] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1808.080086] ? ___ratelimit+0x3b9/0x672 [ 1808.084065] ? idr_get_free+0xf70/0xf70 [ 1808.088024] ? _raw_spin_unlock_irq+0x27/0x80 [ 1808.092509] ? _raw_spin_unlock_irq+0x27/0x80 [ 1808.097000] oom_kill_process.cold.27+0x10/0x903 [ 1808.101770] ? _raw_spin_unlock_irq+0x27/0x80 [ 1808.106253] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1808.110827] ? oom_evaluate_task+0x540/0x540 [ 1808.115237] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1808.120765] ? cgroup_procs_next+0x70/0x70 [ 1808.125001] ? _raw_spin_unlock_irq+0x60/0x80 [ 1808.129481] ? oom_badness+0xaa0/0xaa0 [ 1808.133356] ? mem_cgroup_scan_tasks+0x1c3/0x1e0 [ 1808.138111] ? mem_cgroup_iter_break+0x30/0x30 [ 1808.142709] ? mark_held_locks+0xc7/0x130 [ 1808.146847] out_of_memory+0xa84/0x1430 [ 1808.150808] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1808.155403] ? kasan_check_read+0x11/0x20 [ 1808.159721] ? oom_killer_disable+0x3a0/0x3a0 [ 1808.164223] mem_cgroup_out_of_memory+0x15e/0x210 [ 1808.169054] ? memory_oom_group_write+0x160/0x160 [ 1808.173882] ? mem_cgroup_try_charge+0x627/0xe20 [ 1808.178628] ? page_counter_try_charge+0x1c1/0x220 [ 1808.183549] try_charge+0xda9/0x1700 [ 1808.187253] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1808.192166] ? kasan_check_read+0x11/0x20 [ 1808.196309] ? mem_cgroup_from_task+0x1f0/0x1f0 [ 1808.200969] ? get_mem_cgroup_from_mm.part.62+0x221/0x880 [ 1808.206493] ? lock_page_memcg+0x350/0x350 [ 1808.210722] ? lock_acquire+0x1ed/0x520 [ 1808.214688] ? mem_cgroup_oom_control_write+0x100/0x100 [ 1808.220043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1808.225570] ? check_preemption_disabled+0x48/0x280 [ 1808.230587] ? kasan_check_read+0x11/0x20 [ 1808.234732] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1808.240081] ? rcu_softirq_qs+0x20/0x20 [ 1808.244050] mem_cgroup_try_charge+0x627/0xe20 [ 1808.248618] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1808.254142] ? mem_cgroup_protected+0xa60/0xa60 [ 1808.258823] ? shmem_getattr+0x2c0/0x2c0 [ 1808.262898] ? mark_held_locks+0xc7/0x130 [ 1808.267050] ? print_usage_bug+0xc0/0xc0 [ 1808.271101] ? _raw_spin_unlock_irq+0x27/0x80 [ 1808.275579] ? _raw_spin_unlock_irq+0x27/0x80 [ 1808.280151] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1808.284729] ? print_usage_bug+0xc0/0xc0 [ 1808.288779] ? trace_hardirqs_off_caller+0x310/0x310 [ 1808.293881] mem_cgroup_try_charge_delay+0x1d/0xa0 [ 1808.298799] shmem_getpage_gfp+0x186b/0x4840 [ 1808.303225] ? shmem_add_to_page_cache+0x1950/0x1950 [ 1808.308316] ? mark_held_locks+0x130/0x130 [ 1808.312537] ? zap_class+0x640/0x640 [ 1808.316248] ? find_held_lock+0x36/0x1c0 [ 1808.320301] ? print_usage_bug+0xc0/0xc0 [ 1808.324351] ? __lock_acquire+0x62f/0x4c20 [ 1808.328571] ? find_held_lock+0x36/0x1c0 [ 1808.332627] ? mark_held_locks+0x130/0x130 [ 1808.336860] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1808.341785] ? mark_held_locks+0x130/0x130 [ 1808.346006] ? print_usage_bug+0xc0/0xc0 [ 1808.350054] ? zap_class+0x640/0x640 [ 1808.353758] ? lock_acquire+0x1ed/0x520 [ 1808.357724] ? alloc_set_pte+0x1447/0x1f40 [ 1808.361950] ? kasan_check_read+0x11/0x20 [ 1808.366105] ? do_raw_spin_lock+0x14f/0x350 [ 1808.370417] ? rwlock_bug.part.2+0x90/0x90 [ 1808.374725] ? __lock_is_held+0xb5/0x140 [ 1808.378790] ? _raw_spin_lock+0x35/0x40 [ 1808.382754] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1808.388278] ? alloc_set_pte+0xdee/0x1f40 [ 1808.392415] ? zap_class+0x640/0x640 [ 1808.396127] ? reacquire_held_locks+0x137/0x510 [ 1808.400780] ? alloc_set_pte+0x1447/0x1f40 [ 1808.405002] ? find_held_lock+0x13f/0x1c0 [ 1808.409145] ? filemap_map_pages+0xd6b/0x1a20 [ 1808.413648] ? lock_downgrade+0x900/0x900 [ 1808.417789] ? check_preemption_disabled+0x48/0x280 [ 1808.422799] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1808.427717] ? kasan_check_read+0x11/0x20 [ 1808.431858] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1808.437120] ? rcu_softirq_qs+0x20/0x20 [ 1808.441092] ? filemap_map_pages+0xd92/0x1a20 [ 1808.445600] ? find_get_entries_tag+0x1400/0x1400 [ 1808.450444] ? lock_downgrade+0x900/0x900 [ 1808.454585] ? do_raw_spin_unlock+0xa7/0x330 [ 1808.458984] ? do_raw_spin_trylock+0x270/0x270 [ 1808.463553] ? __pte_alloc_kernel+0x220/0x220 [ 1808.468038] ? __switch_to_asm+0x40/0x70 [ 1808.472087] ? __switch_to_asm+0x34/0x70 [ 1808.476157] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1808.481796] shmem_fault+0x25f/0x960 [ 1808.485496] ? zap_class+0x640/0x640 [ 1808.489203] ? shmem_read_mapping_page_gfp+0x1f0/0x1f0 [ 1808.494477] ? find_held_lock+0x36/0x1c0 [ 1808.498532] __do_fault+0x100/0x6b0 [ 1808.502146] ? lock_downgrade+0x900/0x900 [ 1808.506281] ? pmd_devmap_trans_unstable+0x220/0x220 [ 1808.511371] ? kasan_check_read+0x11/0x20 [ 1808.515507] ? do_raw_spin_unlock+0xa7/0x330 [ 1808.519902] ? do_raw_spin_trylock+0x270/0x270 [ 1808.524482] __handle_mm_fault+0x3ea6/0x5be0 [ 1808.528882] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1808.533713] ? __switch_to_asm+0x34/0x70 [ 1808.537761] ? __switch_to_asm+0x40/0x70 [ 1808.541806] ? __switch_to_asm+0x34/0x70 [ 1808.545852] ? __switch_to_asm+0x40/0x70 [ 1808.549895] ? __switch_to_asm+0x34/0x70 [ 1808.553942] ? __switch_to_asm+0x40/0x70 [ 1808.557988] ? __switch_to_asm+0x34/0x70 [ 1808.562058] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1808.567580] ? pmd_huge+0xf4/0x140 [ 1808.571125] ? zap_class+0x640/0x640 [ 1808.574829] ? zap_class+0x640/0x640 [ 1808.578536] ? find_held_lock+0x36/0x1c0 [ 1808.582592] ? handle_mm_fault+0x42a/0xc70 [ 1808.586815] ? lock_downgrade+0x900/0x900 [ 1808.590972] ? check_preemption_disabled+0x48/0x280 [ 1808.595977] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1808.600893] ? kasan_check_read+0x11/0x20 [ 1808.605025] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1808.610296] ? rcu_softirq_qs+0x20/0x20 [ 1808.614256] ? trace_hardirqs_off_caller+0x310/0x310 [ 1808.619350] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1808.624882] ? check_preemption_disabled+0x48/0x280 [ 1808.629892] handle_mm_fault+0x54f/0xc70 [ 1808.633954] ? __handle_mm_fault+0x5be0/0x5be0 [ 1808.638522] ? __get_user_pages+0x8f8/0x1ea0 [ 1808.642921] __get_user_pages+0xa3d/0x1ea0 [ 1808.647169] ? follow_page_mask+0x2160/0x2160 [ 1808.651667] ? vma_link+0x116/0x180 [ 1808.655284] ? ___perf_sw_event+0x51f/0x7c0 [ 1808.659597] ? zap_class+0x640/0x640 [ 1808.663327] ? rcu_softirq_qs+0x20/0x20 [ 1808.667294] ? lock_acquire+0x1ed/0x520 [ 1808.671272] ? __mm_populate+0x31a/0x4d0 [ 1808.675339] ? lock_release+0xa00/0xa00 [ 1808.679316] ? perf_trace_sched_process_exec+0x860/0x860 [ 1808.684851] populate_vma_page_range+0x2db/0x3d0 [ 1808.689595] ? follow_page+0x420/0x420 [ 1808.693486] ? find_vma+0x34/0x190 [ 1808.697017] __mm_populate+0x286/0x4d0 [ 1808.700897] ? populate_vma_page_range+0x3d0/0x3d0 [ 1808.705816] ? down_read_killable+0x150/0x150 [ 1808.710300] ? security_mmap_file+0x174/0x1b0 [ 1808.714789] vm_mmap_pgoff+0x27f/0x2c0 [ 1808.718710] ? vma_is_stack_for_current+0xd0/0xd0 [ 1808.723542] ? kasan_check_read+0x11/0x20 [ 1808.727677] ? _copy_to_user+0xc8/0x110 [ 1808.731645] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1808.737178] ksys_mmap_pgoff+0xf1/0x660 [ 1808.741138] ? do_syscall_64+0x9a/0x820 [ 1808.745106] ? find_mergeable_anon_vma+0xd0/0xd0 [ 1808.749847] ? trace_hardirqs_on+0xbd/0x310 [ 1808.754171] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1808.759702] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1808.765057] ? trace_hardirqs_off_caller+0x310/0x310 [ 1808.770211] __x64_sys_mmap+0xe9/0x1b0 [ 1808.774097] do_syscall_64+0x1b9/0x820 [ 1808.777988] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1808.783345] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1808.788736] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1808.793571] ? trace_hardirqs_on_caller+0x310/0x310 [ 1808.798578] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1808.803583] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1808.808597] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1808.813440] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1808.818619] RIP: 0033:0x457679 [ 1808.821802] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1808.840700] RSP: 002b:00007f098c899c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 1808.848415] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000457679 [ 1808.855688] RDX: 0000000000000003 RSI: 0000000000b36000 RDI: 0000000020000000 [ 1808.862954] RBP: 000000000072bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 1808.870225] R10: 0000000000008031 R11: 0000000000000246 R12: 00007f098c89a6d4 [ 1808.877480] R13: 00000000004c2d5e R14: 00000000004d5098 R15: 00000000ffffffff [ 1808.887618] Task in /syz1 killed as a result of limit of /syz1 [ 1808.893817] memory: usage 307200kB, limit 307200kB, failcnt 1636 [ 1808.900083] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1808.907153] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1808.920186] Memory cgroup stats for /syz1: cache:3344KB rss:268988KB rss_huge:253952KB shmem:3424KB mapped_file:3432KB dirty:132KB writeback:0KB swap:0KB inactive_anon:3476KB active_anon:269056KB inactive_file:12KB active_file:0KB unevictable:0KB [ 1808.943466] Memory cgroup out of memory: Kill process 24000 (syz-executor1) score 1106 or sacrifice child [ 1808.953737] Killed process 24000 (syz-executor1) total-vm:70604kB, anon-rss:2216kB, file-rss:33568kB, shmem-rss:0kB [ 1808.966003] oom_reaper: reaped process 24000 (syz-executor1), now anon-rss:0kB, file-rss:32800kB, shmem-rss:0kB [ 1809.007013] syz-executor1 invoked oom-killer: gfp_mask=0x6200ca(GFP_HIGHUSER_MOVABLE), nodemask=(null), order=0, oom_score_adj=0 [ 1809.030324] syz-executor1 cpuset=syz1 mems_allowed=0 [ 1809.035667] CPU: 1 PID: 1680 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #151 [ 1809.042951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1809.052308] Call Trace: [ 1809.054907] dump_stack+0x244/0x39d [ 1809.058548] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1809.063752] ? mark_held_locks+0x130/0x130 [ 1809.068000] ? mark_held_locks+0x130/0x130 [ 1809.072338] dump_header+0x27b/0xf72 [ 1809.076091] ? pagefault_out_of_memory+0x197/0x197 [ 1809.081032] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1809.086607] ? check_preemption_disabled+0x48/0x280 [ 1809.091645] ? zap_class+0x640/0x640 [ 1809.095371] ? __lock_is_held+0xb5/0x140 [ 1809.099444] ? zap_class+0x640/0x640 [ 1809.103168] ? print_usage_bug+0xc0/0xc0 [ 1809.107234] ? find_held_lock+0x36/0x1c0 [ 1809.111408] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1809.116961] ? find_held_lock+0x36/0x1c0 [ 1809.121044] ? mark_held_locks+0xc7/0x130 [ 1809.125194] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1809.130281] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1809.135392] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1809.140094] ? trace_hardirqs_on+0xbd/0x310 [ 1809.144508] ? kasan_check_read+0x11/0x20 [ 1809.148653] ? ___ratelimit+0x3b4/0x672 [ 1809.152625] ? trace_hardirqs_off_caller+0x310/0x310 [ 1809.157717] ? trace_hardirqs_on+0x310/0x310 [ 1809.162113] ? lock_downgrade+0x900/0x900 [ 1809.166266] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1809.171367] ? ___ratelimit+0x3b9/0x672 [ 1809.175352] ? idr_get_free+0xf70/0xf70 [ 1809.179324] ? _raw_spin_unlock_irq+0x27/0x80 [ 1809.183805] ? _raw_spin_unlock_irq+0x27/0x80 [ 1809.188292] oom_kill_process.cold.27+0x10/0x903 [ 1809.193210] ? _raw_spin_unlock_irq+0x27/0x80 [ 1809.197710] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1809.202284] ? oom_evaluate_task+0x540/0x540 [ 1809.206681] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1809.212211] ? cgroup_procs_next+0x70/0x70 [ 1809.216431] ? _raw_spin_unlock_irq+0x60/0x80 [ 1809.220914] ? oom_badness+0xaa0/0xaa0 [ 1809.224790] ? mem_cgroup_scan_tasks+0x1c3/0x1e0 [ 1809.229531] ? mem_cgroup_iter_break+0x30/0x30 [ 1809.234104] ? mark_held_locks+0xc7/0x130 [ 1809.238242] out_of_memory+0xa84/0x1430 [ 1809.242204] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1809.246774] ? kasan_check_read+0x11/0x20 [ 1809.251090] ? oom_killer_disable+0x3a0/0x3a0 [ 1809.255606] mem_cgroup_out_of_memory+0x15e/0x210 [ 1809.260441] ? memory_oom_group_write+0x160/0x160 [ 1809.265442] ? mem_cgroup_try_charge+0x627/0xe20 [ 1809.270191] ? page_counter_try_charge+0x1c1/0x220 [ 1809.275108] try_charge+0xda9/0x1700 [ 1809.278828] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1809.283751] ? kasan_check_read+0x11/0x20 [ 1809.287897] ? mem_cgroup_from_task+0x1f0/0x1f0 [ 1809.292559] ? get_mem_cgroup_from_mm.part.62+0x221/0x880 [ 1809.298243] ? lock_page_memcg+0x350/0x350 [ 1809.302470] ? lock_acquire+0x1ed/0x520 [ 1809.306609] ? mem_cgroup_oom_control_write+0x100/0x100 [ 1809.312109] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1809.317636] ? check_preemption_disabled+0x48/0x280 [ 1809.322655] ? kasan_check_read+0x11/0x20 [ 1809.326802] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1809.332059] ? rcu_softirq_qs+0x20/0x20 [ 1809.336022] mem_cgroup_try_charge+0x627/0xe20 [ 1809.340606] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1809.346133] ? mem_cgroup_protected+0xa60/0xa60 [ 1809.350801] ? shmem_getattr+0x2c0/0x2c0 [ 1809.354868] ? mark_held_locks+0xc7/0x130 [ 1809.359143] ? print_usage_bug+0xc0/0xc0 [ 1809.363219] ? _raw_spin_unlock_irq+0x27/0x80 [ 1809.367717] ? _raw_spin_unlock_irq+0x27/0x80 [ 1809.373876] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1809.378446] ? print_usage_bug+0xc0/0xc0 [ 1809.382502] ? trace_hardirqs_off_caller+0x310/0x310 [ 1809.387600] mem_cgroup_try_charge_delay+0x1d/0xa0 [ 1809.392540] shmem_getpage_gfp+0x186b/0x4840 [ 1809.396992] ? shmem_add_to_page_cache+0x1950/0x1950 [ 1809.402091] ? mark_held_locks+0x130/0x130 [ 1809.406311] ? mark_held_locks+0x130/0x130 [ 1809.410533] ? print_usage_bug+0xc0/0xc0 [ 1809.414583] ? set_next_entity+0x493/0xc70 [ 1809.418912] ? __lock_acquire+0x62f/0x4c20 [ 1809.423160] ? __lock_acquire+0x62f/0x4c20 [ 1809.427384] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1809.432920] ? check_preemption_disabled+0x48/0x280 [ 1809.437934] ? mark_held_locks+0x130/0x130 [ 1809.442159] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1809.447165] ? mark_held_locks+0x130/0x130 [ 1809.451666] ? print_usage_bug+0xc0/0xc0 [ 1809.455740] ? zap_class+0x640/0x640 [ 1809.459476] ? lock_acquire+0x1ed/0x520 [ 1809.463433] ? alloc_set_pte+0x1447/0x1f40 [ 1809.467659] ? kasan_check_read+0x11/0x20 [ 1809.471797] ? do_raw_spin_lock+0x14f/0x350 [ 1809.476107] ? rwlock_bug.part.2+0x90/0x90 [ 1809.480328] ? __lock_is_held+0xb5/0x140 [ 1809.484381] ? _raw_spin_lock+0x35/0x40 [ 1809.488358] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1809.493892] ? alloc_set_pte+0xdee/0x1f40 [ 1809.498034] ? zap_class+0x640/0x640 [ 1809.501771] ? reacquire_held_locks+0x137/0x510 [ 1809.506587] ? alloc_set_pte+0x1447/0x1f40 [ 1809.511017] ? find_held_lock+0x13f/0x1c0 [ 1809.515168] ? filemap_map_pages+0xd6b/0x1a20 [ 1809.519660] ? lock_downgrade+0x900/0x900 [ 1809.523797] ? check_preemption_disabled+0x48/0x280 [ 1809.528801] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1809.533724] ? kasan_check_read+0x11/0x20 [ 1809.537857] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1809.543123] ? rcu_softirq_qs+0x20/0x20 [ 1809.547091] ? filemap_map_pages+0xd92/0x1a20 [ 1809.551591] ? find_get_entries_tag+0x1400/0x1400 [ 1809.556418] ? lock_downgrade+0x900/0x900 [ 1809.560806] ? do_raw_spin_unlock+0xa7/0x330 [ 1809.565210] ? do_raw_spin_trylock+0x270/0x270 [ 1809.569783] ? __pte_alloc_kernel+0x220/0x220 [ 1809.574262] ? __switch_to_asm+0x40/0x70 [ 1809.578304] ? __switch_to_asm+0x34/0x70 [ 1809.582356] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1809.587881] shmem_fault+0x25f/0x960 [ 1809.591581] ? zap_class+0x640/0x640 [ 1809.595382] ? shmem_read_mapping_page_gfp+0x1f0/0x1f0 [ 1809.600674] ? find_held_lock+0x36/0x1c0 [ 1809.604730] __do_fault+0x100/0x6b0 [ 1809.608344] ? lock_downgrade+0x900/0x900 [ 1809.612481] ? pmd_devmap_trans_unstable+0x220/0x220 [ 1809.617579] ? kasan_check_read+0x11/0x20 [ 1809.621713] ? do_raw_spin_unlock+0xa7/0x330 [ 1809.626125] ? do_raw_spin_trylock+0x270/0x270 [ 1809.630704] __handle_mm_fault+0x3ea6/0x5be0 [ 1809.635101] ? rcu_preempt_deferred_qs_irqrestore+0x8a5/0x1000 [ 1809.641067] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1809.645902] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1809.650993] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1809.656514] ? pmd_huge+0xf4/0x140 [ 1809.660074] ? zap_class+0x640/0x640 [ 1809.663785] ? zap_class+0x640/0x640 [ 1809.667484] ? find_held_lock+0x36/0x1c0 [ 1809.671560] ? handle_mm_fault+0x42a/0xc70 [ 1809.675879] ? lock_downgrade+0x900/0x900 [ 1809.680013] ? check_preemption_disabled+0x48/0x280 [ 1809.685040] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1809.689966] ? kasan_check_read+0x11/0x20 [ 1809.694112] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1809.699387] ? rcu_softirq_qs+0x20/0x20 [ 1809.703349] ? trace_hardirqs_off_caller+0x310/0x310 [ 1809.708525] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1809.714073] ? check_preemption_disabled+0x48/0x280 [ 1809.719156] handle_mm_fault+0x54f/0xc70 [ 1809.723217] ? __handle_mm_fault+0x5be0/0x5be0 [ 1809.727787] ? __get_user_pages+0x8f8/0x1ea0 [ 1809.732183] __get_user_pages+0xa3d/0x1ea0 [ 1809.736408] ? follow_page_mask+0x2160/0x2160 [ 1809.740901] ? vma_link+0x116/0x180 [ 1809.744517] ? ___perf_sw_event+0x51f/0x7c0 [ 1809.748853] ? zap_class+0x640/0x640 [ 1809.752562] ? rcu_softirq_qs+0x20/0x20 [ 1809.756530] ? lock_acquire+0x1ed/0x520 [ 1809.760496] ? __mm_populate+0x31a/0x4d0 [ 1809.764672] ? lock_release+0xa00/0xa00 [ 1809.768634] ? perf_trace_sched_process_exec+0x860/0x860 [ 1809.774079] populate_vma_page_range+0x2db/0x3d0 [ 1809.778929] ? follow_page+0x420/0x420 [ 1809.782811] ? find_vma+0x34/0x190 [ 1809.786350] __mm_populate+0x286/0x4d0 [ 1809.790236] ? populate_vma_page_range+0x3d0/0x3d0 [ 1809.795153] ? down_read_killable+0x150/0x150 [ 1809.799639] ? security_mmap_file+0x174/0x1b0 [ 1809.804126] vm_mmap_pgoff+0x27f/0x2c0 [ 1809.808007] ? vma_is_stack_for_current+0xd0/0xd0 [ 1809.812838] ? kasan_check_read+0x11/0x20 [ 1809.817074] ? _copy_to_user+0xc8/0x110 [ 1809.821060] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1809.826595] ksys_mmap_pgoff+0xf1/0x660 [ 1809.830561] ? do_syscall_64+0x9a/0x820 [ 1809.834535] ? find_mergeable_anon_vma+0xd0/0xd0 [ 1809.839277] ? trace_hardirqs_on+0xbd/0x310 [ 1809.843614] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1809.849236] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1809.854614] ? trace_hardirqs_off_caller+0x310/0x310 [ 1809.859711] __x64_sys_mmap+0xe9/0x1b0 [ 1809.863638] do_syscall_64+0x1b9/0x820 [ 1809.867516] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1809.872878] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1809.877790] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1809.882792] ? trace_hardirqs_on_caller+0x310/0x310 [ 1809.887989] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1809.892994] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1809.898169] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1809.903003] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1809.908227] RIP: 0033:0x457679 [ 1809.911413] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1809.930297] RSP: 002b:00007f098c899c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 1809.938004] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000457679 [ 1809.945385] RDX: 0000000000000003 RSI: 0000000000b36000 RDI: 0000000020000000 [ 1809.952640] RBP: 000000000072bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 1809.959908] R10: 0000000000008031 R11: 0000000000000246 R12: 00007f098c89a6d4 [ 1809.967543] R13: 00000000004c2d5e R14: 00000000004d5098 R15: 00000000ffffffff [ 1809.976759] Task in /syz1 killed as a result of limit of /syz1 [ 1809.983324] memory: usage 307076kB, limit 307200kB, failcnt 1668 [ 1809.989483] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1809.996312] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1810.002492] Memory cgroup stats for /syz1: cache:5588KB rss:266828KB rss_huge:251904KB shmem:5536KB mapped_file:5544KB dirty:132KB writeback:0KB swap:0KB inactive_anon:5684KB active_anon:266856KB inactive_file:0KB active_file:4KB unevictable:0KB [ 1810.024553] Memory cgroup out of memory: Kill process 22913 (syz-executor1) score 1106 or sacrifice child [ 1810.034362] Killed process 22913 (syz-executor1) total-vm:70604kB, anon-rss:2208kB, file-rss:33552kB, shmem-rss:0kB [ 1810.049734] oom_reaper: reaped process 22913 (syz-executor1), now anon-rss:0kB, file-rss:32784kB, shmem-rss:0kB [ 1810.079785] syz-executor1 invoked oom-killer: gfp_mask=0x6200ca(GFP_HIGHUSER_MOVABLE), nodemask=(null), order=0, oom_score_adj=0 [ 1810.091646] syz-executor1 cpuset=syz1 mems_allowed=0 [ 1810.096770] CPU: 1 PID: 1680 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #151 [ 1810.104053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1810.113434] Call Trace: [ 1810.116040] dump_stack+0x244/0x39d [ 1810.119672] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1810.124893] ? mark_held_locks+0x130/0x130 [ 1810.129137] ? mark_held_locks+0x130/0x130 [ 1810.133378] dump_header+0x27b/0xf72 [ 1810.137113] ? pagefault_out_of_memory+0x197/0x197 [ 1810.142053] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1810.147604] ? check_preemption_disabled+0x48/0x280 [ 1810.152648] ? zap_class+0x640/0x640 [ 1810.156367] ? __lock_is_held+0xb5/0x140 [ 1810.160437] ? zap_class+0x640/0x640 [ 1810.164171] ? print_usage_bug+0xc0/0xc0 [ 1810.168241] ? find_held_lock+0x36/0x1c0 [ 1810.172313] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1810.177953] ? find_held_lock+0x36/0x1c0 [ 1810.182046] ? mark_held_locks+0xc7/0x130 [ 1810.186214] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1810.191325] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1810.196438] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1810.201030] ? trace_hardirqs_on+0xbd/0x310 [ 1810.205388] ? kasan_check_read+0x11/0x20 [ 1810.209556] ? ___ratelimit+0x3b4/0x672 [ 1810.213539] ? trace_hardirqs_off_caller+0x310/0x310 [ 1810.218648] ? trace_hardirqs_on+0x310/0x310 [ 1810.223063] ? lock_downgrade+0x900/0x900 [ 1810.227229] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1810.232338] ? ___ratelimit+0x3b9/0x672 [ 1810.236335] ? idr_get_free+0xf70/0xf70 [ 1810.240313] ? _raw_spin_unlock_irq+0x27/0x80 [ 1810.244816] ? _raw_spin_unlock_irq+0x27/0x80 [ 1810.249302] oom_kill_process.cold.27+0x10/0x903 [ 1810.254042] ? _raw_spin_unlock_irq+0x27/0x80 [ 1810.258527] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1810.263096] ? oom_evaluate_task+0x540/0x540 [ 1810.267499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1810.273036] ? cgroup_procs_next+0x70/0x70 [ 1810.277265] ? _raw_spin_unlock_irq+0x60/0x80 [ 1810.281744] ? oom_badness+0xaa0/0xaa0 [ 1810.285620] ? mem_cgroup_scan_tasks+0x1c3/0x1e0 [ 1810.290364] ? mem_cgroup_iter_break+0x30/0x30 [ 1810.294940] ? mark_held_locks+0xc7/0x130 [ 1810.299197] out_of_memory+0xa84/0x1430 [ 1810.303156] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1810.307722] ? kasan_check_read+0x11/0x20 [ 1810.311864] ? oom_killer_disable+0x3a0/0x3a0 [ 1810.316351] mem_cgroup_out_of_memory+0x15e/0x210 [ 1810.321177] ? memory_oom_group_write+0x160/0x160 [ 1810.326038] ? mem_cgroup_try_charge+0x627/0xe20 [ 1810.330870] ? page_counter_try_charge+0x1c1/0x220 [ 1810.335803] try_charge+0xda9/0x1700 [ 1810.339530] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1810.344457] ? kasan_check_read+0x11/0x20 [ 1810.348608] ? mem_cgroup_from_task+0x1f0/0x1f0 [ 1810.353276] ? get_mem_cgroup_from_mm.part.62+0x221/0x880 [ 1810.358812] ? lock_page_memcg+0x350/0x350 [ 1810.363040] ? lock_acquire+0x1ed/0x520 [ 1810.367020] ? mem_cgroup_oom_control_write+0x100/0x100 [ 1810.372387] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1810.377952] ? check_preemption_disabled+0x48/0x280 [ 1810.382963] ? kasan_check_read+0x11/0x20 [ 1810.387094] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1810.392358] ? rcu_softirq_qs+0x20/0x20 [ 1810.396327] mem_cgroup_try_charge+0x627/0xe20 [ 1810.400894] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1810.406418] ? mem_cgroup_protected+0xa60/0xa60 [ 1810.411072] ? shmem_getattr+0x2c0/0x2c0 [ 1810.415126] ? mark_held_locks+0xc7/0x130 [ 1810.419262] ? print_usage_bug+0xc0/0xc0 [ 1810.423452] ? _raw_spin_unlock_irq+0x27/0x80 [ 1810.427960] ? _raw_spin_unlock_irq+0x27/0x80 [ 1810.432449] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1810.437019] ? print_usage_bug+0xc0/0xc0 [ 1810.441068] ? trace_hardirqs_off_caller+0x310/0x310 [ 1810.446158] ? lock_downgrade+0x900/0x900 [ 1810.450293] mem_cgroup_try_charge_delay+0x1d/0xa0 [ 1810.455208] shmem_getpage_gfp+0x186b/0x4840 [ 1810.459609] ? shmem_add_to_page_cache+0x1950/0x1950 [ 1810.464705] ? mark_held_locks+0x130/0x130 [ 1810.468925] ? print_usage_bug+0xc0/0xc0 [ 1810.472978] ? drain_local_pages_wq+0x40/0x40 [ 1810.477461] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1810.482059] ? print_usage_bug+0xc0/0xc0 [ 1810.486107] ? kasan_check_read+0x11/0x20 [ 1810.490258] ? __lock_acquire+0x62f/0x4c20 [ 1810.494490] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1810.500045] ? mark_held_locks+0x130/0x130 [ 1810.504271] ? trace_hardirqs_on+0xbd/0x310 [ 1810.508579] ? __free_pages+0x149/0x190 [ 1810.512535] ? trace_hardirqs_off_caller+0x310/0x310 [ 1810.517625] ? mark_held_locks+0x130/0x130 [ 1810.521847] ? print_usage_bug+0xc0/0xc0 [ 1810.525894] ? zap_class+0x640/0x640 [ 1810.529608] ? lock_acquire+0x1ed/0x520 [ 1810.533580] ? alloc_set_pte+0x1447/0x1f40 [ 1810.537842] ? kasan_check_read+0x11/0x20 [ 1810.541975] ? do_raw_spin_lock+0x14f/0x350 [ 1810.546372] ? rwlock_bug.part.2+0x90/0x90 [ 1810.550594] ? __lock_is_held+0xb5/0x140 [ 1810.554666] ? _raw_spin_lock+0x35/0x40 [ 1810.558638] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1810.564166] ? alloc_set_pte+0xdee/0x1f40 [ 1810.568298] ? zap_class+0x640/0x640 [ 1810.572001] ? reacquire_held_locks+0x137/0x510 [ 1810.576709] ? alloc_set_pte+0x1447/0x1f40 [ 1810.580936] ? find_held_lock+0x13f/0x1c0 [ 1810.585075] ? filemap_map_pages+0xd6b/0x1a20 [ 1810.589555] ? lock_downgrade+0x900/0x900 [ 1810.593698] ? check_preemption_disabled+0x48/0x280 [ 1810.598712] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1810.603640] ? kasan_check_read+0x11/0x20 [ 1810.607769] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1810.613029] ? rcu_softirq_qs+0x20/0x20 [ 1810.617001] ? filemap_map_pages+0xd92/0x1a20 [ 1810.621498] ? find_get_entries_tag+0x1400/0x1400 [ 1810.626339] ? lock_downgrade+0x900/0x900 [ 1810.630485] ? do_raw_spin_unlock+0xa7/0x330 [ 1810.634973] ? do_raw_spin_trylock+0x270/0x270 [ 1810.639635] ? __pte_alloc_kernel+0x220/0x220 [ 1810.644116] ? __switch_to_asm+0x40/0x70 [ 1810.648289] ? __switch_to_asm+0x34/0x70 [ 1810.652340] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1810.657864] shmem_fault+0x25f/0x960 [ 1810.661569] ? zap_class+0x640/0x640 [ 1810.665384] ? shmem_read_mapping_page_gfp+0x1f0/0x1f0 [ 1810.670666] ? find_held_lock+0x36/0x1c0 [ 1810.674721] __do_fault+0x100/0x6b0 [ 1810.678446] ? lock_downgrade+0x900/0x900 [ 1810.682587] ? pmd_devmap_trans_unstable+0x220/0x220 [ 1810.687675] ? kasan_check_read+0x11/0x20 [ 1810.691818] ? do_raw_spin_unlock+0xa7/0x330 [ 1810.696228] ? do_raw_spin_trylock+0x270/0x270 [ 1810.700810] __handle_mm_fault+0x3ea6/0x5be0 [ 1810.705314] ? rcu_preempt_deferred_qs_irqrestore+0x8a5/0x1000 [ 1810.711279] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1810.716129] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1810.721228] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1810.726754] ? pmd_huge+0xf4/0x140 [ 1810.730292] ? zap_class+0x640/0x640 [ 1810.734010] ? zap_class+0x640/0x640 [ 1810.737710] ? find_held_lock+0x36/0x1c0 [ 1810.741793] ? handle_mm_fault+0x42a/0xc70 [ 1810.746022] ? lock_downgrade+0x900/0x900 [ 1810.750179] ? check_preemption_disabled+0x48/0x280 [ 1810.755192] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1810.760109] ? kasan_check_read+0x11/0x20 [ 1810.764242] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1810.769502] ? rcu_softirq_qs+0x20/0x20 [ 1810.773468] ? trace_hardirqs_off_caller+0x310/0x310 [ 1810.778564] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1810.784096] ? check_preemption_disabled+0x48/0x280 [ 1810.789114] handle_mm_fault+0x54f/0xc70 [ 1810.793214] ? __handle_mm_fault+0x5be0/0x5be0 [ 1810.797797] ? __get_user_pages+0x8f8/0x1ea0 [ 1810.802239] __get_user_pages+0xa3d/0x1ea0 [ 1810.806500] ? follow_page_mask+0x2160/0x2160 [ 1810.811002] ? vma_link+0x116/0x180 [ 1810.814646] ? ___perf_sw_event+0x51f/0x7c0 [ 1810.818988] ? zap_class+0x640/0x640 [ 1810.822702] ? rcu_softirq_qs+0x20/0x20 [ 1810.826691] ? lock_acquire+0x1ed/0x520 [ 1810.830703] ? __mm_populate+0x31a/0x4d0 [ 1810.834786] ? lock_release+0xa00/0xa00 [ 1810.834801] ? perf_trace_sched_process_exec+0x860/0x860 [ 1810.834827] populate_vma_page_range+0x2db/0x3d0 [ 1810.834845] ? follow_page+0x420/0x420 [ 1810.852863] ? find_vma+0x34/0x190 [ 1810.856414] __mm_populate+0x286/0x4d0 [ 1810.860313] ? populate_vma_page_range+0x3d0/0x3d0 [ 1810.865249] ? down_read_killable+0x150/0x150 [ 1810.869733] ? security_mmap_file+0x174/0x1b0 [ 1810.874317] vm_mmap_pgoff+0x27f/0x2c0 [ 1810.878207] ? vma_is_stack_for_current+0xd0/0xd0 03:54:31 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:54:31 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x20000000000000a, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) getsockopt$sock_buf(r1, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) 03:54:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80), 0x0, 0x0, 0x0) 03:54:31 executing program 4: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:31 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xfdffffff, 0x0) [ 1810.883039] ? kasan_check_read+0x11/0x20 [ 1810.887173] ? _copy_to_user+0xc8/0x110 [ 1810.891152] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1810.896702] ksys_mmap_pgoff+0xf1/0x660 [ 1810.900684] ? do_syscall_64+0x9a/0x820 [ 1810.904672] ? find_mergeable_anon_vma+0xd0/0xd0 [ 1810.909454] ? trace_hardirqs_on+0xbd/0x310 [ 1810.913792] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1810.919340] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1810.924711] ? trace_hardirqs_off_caller+0x310/0x310 [ 1810.929831] __x64_sys_mmap+0xe9/0x1b0 03:54:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80), 0x0, 0x0, 0x0) [ 1810.933738] do_syscall_64+0x1b9/0x820 [ 1810.937643] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1810.943017] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1810.947971] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1810.952830] ? trace_hardirqs_on_caller+0x310/0x310 [ 1810.957866] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1810.962896] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1810.968386] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1810.973245] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1810.978446] RIP: 0033:0x457679 [ 1810.981645] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1811.000654] RSP: 002b:00007f098c899c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 1811.008485] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000457679 [ 1811.015855] RDX: 0000000000000003 RSI: 0000000000b36000 RDI: 0000000020000000 [ 1811.015868] RBP: 000000000072bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 1811.030383] R10: 0000000000008031 R11: 0000000000000246 R12: 00007f098c89a6d4 [ 1811.030392] R13: 00000000004c2d5e R14: 00000000004d5098 R15: 00000000ffffffff [ 1811.038900] Task in /syz1 killed as a result of limit of /syz1 [ 1811.051398] memory: usage 307016kB, limit 307200kB, failcnt 1725 [ 1811.065412] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1811.072274] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1811.078416] Memory cgroup stats for /syz1: cache:7832KB rss:264636KB rss_huge:249856KB shmem:7780KB mapped_file:7920KB dirty:132KB writeback:0KB swap:0KB inactive_anon:8032KB active_anon:264668KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1811.100753] Memory cgroup out of memory: Kill process 22328 (syz-executor1) score 1100 or sacrifice child [ 1811.110607] Killed process 22328 (syz-executor1) total-vm:54088kB, anon-rss:152kB, file-rss:33648kB, shmem-rss:0kB 03:54:31 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80004, 0x6e) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000840)={'mangle\x00', 0x1000, "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"}, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x4e24, @remote}, {0x2, 0x4, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)='bridge_slave_1\x00', 0x5, 0x4}) 03:54:31 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 03:54:31 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) getsockopt$sock_buf(r1, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) 03:54:31 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:54:31 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:31 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x3f000000, 0x0) 03:54:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 03:54:31 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) getsockopt$sock_buf(r1, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) [ 1811.297027] hfsplus: unable to find HFS+ superblock 03:54:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 03:54:32 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) [ 1811.353678] hfsplus: unable to find HFS+ superblock 03:54:32 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) getsockopt$sock_buf(r1, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) 03:54:32 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x80004, 0x6e) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000840)={'mangle\x00', 0x1000, "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"}, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {}, {0x2, 0x4e24, @remote}, {0x2, 0x4, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)='bridge_slave_1\x00', 0x5, 0x4}) 03:54:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)}}], 0x1, 0x0, 0x0) 03:54:34 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) 03:54:34 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x74000000, 0x0) 03:54:34 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:34 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:54:34 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, 0x0, 0x0) 03:54:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)}}], 0x1, 0x0, 0x0) 03:54:34 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:34 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) [ 1814.250842] hfsplus: unable to find HFS+ superblock 03:54:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)}}], 0x1, 0x0, 0x0) 03:54:34 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) 03:54:35 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) [ 1814.346690] hfsplus: unable to find HFS+ superblock 03:54:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@setlink={0x34, 0x13, 0x19, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'ip_vti0\x00'}]}, 0x34}}, 0x0) 03:54:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 03:54:35 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2c00, 0x0) 03:54:35 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) 03:54:35 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:35 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20000000) epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) inotify_rm_watch(r0, r1) 03:54:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 03:54:35 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:35 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) getsockopt$sock_buf(r1, 0x1, 0x0, &(0x7f0000b56f40)=""/192, &(0x7f0000004ffc)=0xc0) 03:54:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01ab", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000000540)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000180)=""/236, 0xec}], 0x1}}], 0x1, 0x0, 0x0) 03:54:38 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) 03:54:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="ff2216114fb9c06cc68bd70e09f3e3f7", 0x10}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 03:54:38 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x4d50, 0x0) 03:54:38 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) getsockopt$sock_buf(r1, 0x1, 0x19, 0x0, &(0x7f0000004ffc)) 03:54:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:38 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x5, 0x8f, 0x800, 0x5}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001180)={r0, &(0x7f0000000080), 0x0}, 0x18) 03:54:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:38 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) getsockopt$sock_buf(r1, 0x1, 0x19, &(0x7f0000b56f40)=""/192, 0x0) [ 1817.470721] hfsplus: unable to find HFS+ superblock 03:54:38 executing program 1: 03:54:38 executing program 0: 03:54:38 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) [ 1817.558892] hfsplus: unable to find HFS+ superblock 03:54:38 executing program 1: 03:54:38 executing program 0: 03:54:38 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x7a00, 0x0) 03:54:38 executing program 5: 03:54:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:38 executing program 0: 03:54:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ipv6_route\x00') sendfile(r1, r2, &(0x7f00000002c0)=0xe00, 0x1000007ffff000) 03:54:38 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x11, 0x2, 0x0) io_setup(0x9, &(0x7f0000000000)=0x0) io_submit(r1, 0x2, &(0x7f00000005c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x7}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x2, 0x0, r0, 0x0}]) 03:54:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:38 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xe00, 0x0) 03:54:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000180)={@multicast2, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) [ 1817.903356] hfsplus: unable to find HFS+ superblock [ 1817.977616] hfsplus: unable to find HFS+ superblock 03:54:41 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:41 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000000)={0xf, 0x0, &(0x7f0000005fd4)=ANY=[@ANYBLOB="05630440000000000e630c4000006a"], 0x0, 0x0, 0x0}) 03:54:41 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x0) 03:54:41 executing program 5: io_setup(0x8, &(0x7f0000000040)=0x0) io_getevents(r0, 0xfffffffffffffff8, 0x0, 0x0, 0x0) 03:54:41 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 03:54:41 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff5, 0x0) 03:54:41 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) sendto$inet6(r1, &(0x7f0000000100), 0x0, 0x20000001, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0xffff, 0x0) 03:54:41 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:41 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xfdfdffff00000000, 0x0) 03:54:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000fb1000)=[{&(0x7f0000000200)="480000001400197f09004b0101048c590a88ffffff510c5c3f010001002000000028213ee20600d48696869db7a6aa4518965e704cd0ff5bffff00cfe5ed5ef1b6e09f0000000000", 0x48}], 0x1) 03:54:41 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x208200) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x40042, 0x0) write$apparmor_exec(r3, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x1) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000500)={0x0, 0xc000000000000000, 0x0, 0x0, 0x2, [{}, {}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, 0x0, 0x0) 03:54:41 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:41 executing program 0: socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x37) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x31}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:54:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'bond_slave_0\x00'}) 03:54:42 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') sendfile(r0, r1, 0x0, 0x1) 03:54:42 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) [ 1821.586860] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1821.594136] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1821.606217] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1821.614287] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1821.629026] A link change request failed with some changes committed already. Interface wlan0 may have been left with an inconsistent configuration, please check. [ 1821.655032] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 1821.756010] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1821.762987] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1821.772190] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1821.780291] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1821.790284] A link change request failed with some changes committed already. Interface wlan0 may have been left with an inconsistent configuration, please check. [ 1821.815164] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 1821.904936] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 03:54:44 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 03:54:44 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x97ffffff, 0x0) 03:54:44 executing program 0: r0 = socket$inet(0x2, 0x3, 0x2) sendto$inet(r0, &(0x7f0000edf000), 0x0, 0x0, 0x0, 0x0) 03:54:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000580)={'bond0\x00'}) r1 = socket(0x20000000000000a, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bond0\x00', 0xffb}) 03:54:44 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:44 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x800000042, 0x1, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000000)={r0, &(0x7f00000000c0), 0x0}, 0x20) 03:54:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x2000d06f}}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 03:54:44 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) close(r0) 03:54:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha3-384-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 03:54:44 executing program 0: 03:54:44 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2c00000000000000, 0x0) 03:54:44 executing program 0: [ 1824.251199] device bond0 entered promiscuous mode [ 1824.261812] device bond_slave_0 entered promiscuous mode [ 1824.269042] device bond_slave_1 entered promiscuous mode [ 1824.277359] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1824.287630] device bond0 left promiscuous mode [ 1824.292254] device bond_slave_0 left promiscuous mode [ 1824.297914] device bond_slave_1 left promiscuous mode [ 1824.445211] device bond0 entered promiscuous mode [ 1824.450404] device bond_slave_0 entered promiscuous mode [ 1824.456696] device bond_slave_1 entered promiscuous mode [ 1824.463177] 8021q: adding VLAN 0 to HW filter on device bond0 03:54:47 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 03:54:47 executing program 1: 03:54:47 executing program 0: 03:54:47 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x5848, 0x0) 03:54:47 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:47 executing program 5: 03:54:47 executing program 0: 03:54:47 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000000)=0x1) 03:54:47 executing program 5: getgroups(0x7, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0]) setgroups(0x0, 0x0) setregid(0x0, r0) setuid(0xee01) msgget(0x2, 0x248) 03:54:47 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 03:54:47 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, 0x0, 0x0, 0x0) 03:54:47 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000005000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000000, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f00800", 0x0, 0x100}, 0x28) 03:54:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 03:54:47 executing program 5: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, 0x0}, 0x0) 03:54:47 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x22, 0x0) 03:54:47 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(0x0, 0x0) [ 1827.035606] IPv6: NLM_F_CREATE should be specified when creating new route 03:54:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x29) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="fd86b00eb8dd06e3ad071cd4685c", 0x0, 0xf000}, 0x28) 03:54:47 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) sync_file_range(r1, 0x60f79031, 0x200, 0x5) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) unshare(0x40600) gettid() stat(0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, 0x0, r5) pwritev(r2, 0x0, 0x0, 0xfffffffffffffffc) timer_create(0x0, &(0x7f0000000100), 0x0) write(r3, &(0x7f00000001c0), 0xfffffffffffffeb0) vmsplice(r2, &(0x7f0000000240)=[{&(0x7f0000000500), 0xffffffffffffffa7}], 0x2ff, 0x0) getsockname(r4, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000140)=0x80) getsockopt$bt_hci(r3, 0x0, 0x1, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r6, &(0x7f0000000700), 0x31f, 0x10400003) 03:54:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400add427323b470c458c560a067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffeffe809000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 03:54:47 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x3, &(0x7f0000000000)=@framed, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0x3f5, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) close(r2) 03:54:47 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2b48, 0x0) 03:54:47 executing program 5: socketpair$unix(0x1, 0x100000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000400)={"65716c00000000000000000000000200", 0x12}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x301) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={"65716c000000a95b00", @ifru_mtu=0x1}) 03:54:50 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='veth1_to_bond\x00', 0x10) bind$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) 03:54:50 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capget(&(0x7f0000000080)={0x40020080522}, 0x0) 03:54:50 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000004c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x4, 0x4, 0x4, 0xd}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x2, 0x3, 0x2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f0000000200)}, 0x20) socketpair(0x80000000001, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f0, &(0x7f0000000300)='0\x00') 03:54:50 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, 0x0, 0x0, 0x0) 03:54:50 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x100000000000000, 0x0) 03:54:50 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0xc9) r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4000001, 0x182) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000140)=ANY=[@ANYBLOB="000000007600000000000000ddffffff20000000000800000000000000000000000000000000000000000000506f4153a6f9f834b3be1cd4e1a314a1d6e3ad1c2f2b"]) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(r2, &(0x7f00000005c0)="f250a52c636aec57850192c5a60d48f5caed6ba55b06854fe80aedc65335a6c53bc81260aef7ef6fba7cfedf50c3c17ae3e224813ca881f0da031b7d58fcdea9af9f534b7f45f89e10d3da2e82e49ecb74409794383b3508849e5ce30b8ab61ccfcfa0fa2078784d62fd4dd173dae225eaa22e0e308ffa32ad8d47208c492b3d527e40449c7ddca3355246814f1efca274a9d5b765f2fde9c3793bfe66a3af399d2a94edcef06b215880f0512653afbc251adeb4c7d65e86c1861297c61a434bc9ffd624f398b238e44810bf860a29c03577", 0xd2, 0x20000000, 0x0, 0x0) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) getsockopt$inet_buf(r3, 0x0, 0x2000000000000010, 0x0, &(0x7f0000000380)) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x8) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000003c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x1, 0x9}}, 0x30) ioctl$LOOP_SET_FD(r2, 0x4c00, r2) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) keyctl$clear(0x7, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x49, 0x1, {0x4, 0x1, 0x6}}, 0x14) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f00000001c0)=0x4) write(0xffffffffffffffff, &(0x7f0000000080), 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200), 0xc, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x40) 03:54:50 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x6b6b6b00000000, 0x0) 03:54:50 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x3fffff) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)}, 0x800) getpid() bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, r0, 0x0, 0x0, 0x0}, 0x30) recvmsg(0xffffffffffffffff, 0x0, 0x40000102) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000480)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4, 0x0, {0xa, 0x4e24, 0x80, @mcast1, 0x1}}}, 0x80, &(0x7f00000005c0)}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.stat\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000300)) socketpair(0x9, 0x5, 0x5, &(0x7f00000008c0)) getpid() perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r1, 0x4}, 0x14) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00'}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40), 0x0, &(0x7f0000000b80)=""/240, 0xf0, 0x1b22}, 0x100) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000580)) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000440)="6c6f00966fd651b959a9644a2c00d2970403dc0d") ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000680)="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") 03:54:50 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000080)={0x10, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB], @ANYPTR=&(0x7f0000000240)=ANY=[]], 0x0, 0x0, 0x0}) [ 1830.242043] device lo entered promiscuous mode 03:54:50 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), 0x0, 0x2}, 0x20) 03:54:50 executing program 4: syz_emit_ethernet(0x300606, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300003, 0xffffff6c, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff83, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4888], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 1830.275735] print_req_error: 600 callbacks suppressed [ 1830.275747] print_req_error: I/O error, dev loop5, sector 1024 [ 1830.331915] print_req_error: I/O error, dev loop5, sector 0 [ 1830.337671] buffer_io_error: 597 callbacks suppressed [ 1830.337681] Buffer I/O error on dev loop5, logical block 0, lost async page write [ 1830.350864] print_req_error: I/O error, dev loop5, sector 8 [ 1830.356617] Buffer I/O error on dev loop5, logical block 1, lost async page write [ 1830.364698] print_req_error: I/O error, dev loop5, sector 16 [ 1830.370786] Buffer I/O error on dev loop5, logical block 2, lost async page write [ 1830.378477] print_req_error: I/O error, dev loop5, sector 24 [ 1830.385241] Buffer I/O error on dev loop5, logical block 3, lost async page write [ 1830.393028] print_req_error: I/O error, dev loop5, sector 32 [ 1830.398836] Buffer I/O error on dev loop5, logical block 4, lost async page write [ 1830.406634] print_req_error: I/O error, dev loop5, sector 40 [ 1830.412496] Buffer I/O error on dev loop5, logical block 5, lost async page write [ 1830.420252] print_req_error: I/O error, dev loop5, sector 48 03:54:51 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x7000000, 0x0) 03:54:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') fchown(r0, 0x0, 0x0) [ 1830.426153] Buffer I/O error on dev loop5, logical block 6, lost async page write [ 1830.433888] print_req_error: I/O error, dev loop5, sector 56 [ 1830.439697] Buffer I/O error on dev loop5, logical block 7, lost async page write [ 1830.447679] print_req_error: I/O error, dev loop5, sector 64 [ 1830.453594] Buffer I/O error on dev loop5, logical block 8, lost async page write [ 1830.461426] Buffer I/O error on dev loop5, logical block 9, lost async page write [ 1830.499572] hfsplus: unable to find HFS+ superblock [ 1830.579308] hfsplus: unable to find HFS+ superblock 03:54:53 executing program 4: syz_emit_ethernet(0x300606, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300003, 0xffffff6c, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff83, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4888], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 03:54:53 executing program 2: socket$inet6(0x10, 0x3, 0x0) clone(0x400003102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, 0x0, 0x0, 0x0) 03:54:53 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/snmp\x00') pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f00000005c0)=[{r0}, {r1, 0x9604}], 0x2, 0x0) 03:54:53 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000000)) 03:54:53 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0xc9) r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4000001, 0x182) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000140)=ANY=[@ANYBLOB="000000007600000000000000ddffffff20000000000800000000000000000000000000000000000000000000506f4153a6f9f834b3be1cd4e1a314a1d6e3ad1c2f2b"]) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(r2, &(0x7f00000005c0)="f250a52c636aec57850192c5a60d48f5caed6ba55b06854fe80aedc65335a6c53bc81260aef7ef6fba7cfedf50c3c17ae3e224813ca881f0da031b7d58fcdea9af9f534b7f45f89e10d3da2e82e49ecb74409794383b3508849e5ce30b8ab61ccfcfa0fa2078784d62fd4dd173dae225eaa22e0e308ffa32ad8d47208c492b3d527e40449c7ddca3355246814f1efca274a9d5b765f2fde9c3793bfe66a3af399d2a94edcef06b215880f0512653afbc251adeb4c7d65e86c1861297c61a434bc9ffd624f398b238e44810bf860a29c03577", 0xd2, 0x20000000, 0x0, 0x0) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) getsockopt$inet_buf(r3, 0x0, 0x2000000000000010, 0x0, &(0x7f0000000380)) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x8) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000003c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x1, 0x9}}, 0x30) ioctl$LOOP_SET_FD(r2, 0x4c00, r2) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) keyctl$clear(0x7, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x49, 0x1, {0x4, 0x1, 0x6}}, 0x14) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f00000001c0)=0x4) write(0xffffffffffffffff, &(0x7f0000000080), 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200), 0xc, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x40) 03:54:53 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xff0f, 0x0) 03:54:53 executing program 0: seccomp(0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8921, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xffffffea) r3 = epoll_create(0xe29f) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigpending(&(0x7f0000000400), 0x8) ppoll(&(0x7f0000000140)=[{r3}, {r1}], 0x2, 0x0, &(0x7f0000000040), 0x8) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000440), 0xc, &(0x7f00000005c0)={&(0x7f00000007c0)=ANY=[]}}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) close(r2) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000040), 0x4) r4 = shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffa000/0x4000)=nil) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) shmctl$SHM_STAT(r4, 0xd, &(0x7f0000000200)=""/55) getrandom(&(0x7f0000000180)=""/102, 0x66, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r5, &(0x7f0000000080), 0x297ef) socket$inet6_udp(0xa, 0x2, 0x0) 03:54:53 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000001300), 0x40000a2, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) 03:54:53 executing program 4: syz_emit_ethernet(0x300606, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300003, 0xffffff6c, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff83, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4888], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 03:54:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000bc0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'bridge0\x00', @random="01003a1e2410"}) [ 1833.183756] audit: type=1326 audit(2000001293.826:1432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2193 comm="syz-executor0" exe="/root/syz-executor0" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0x0 03:54:53 executing program 4: syz_emit_ethernet(0x300606, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300003, 0xffffff6c, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff83, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4888], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 03:54:53 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x7, 0x0) 03:54:54 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) [ 1833.420440] hfsplus: unable to find HFS+ superblock [ 1833.456688] hfsplus: unable to find HFS+ superblock [ 1833.978856] audit: type=1326 audit(2000001294.606:1433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2193 comm="syz-executor0" exe="/root/syz-executor0" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0x0 03:54:56 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) 03:54:56 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000010000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @dev, 0x0, 0x0, 'wrr\x00'}, 0x2c) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 03:54:56 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) 03:54:56 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:54:56 executing program 0: seccomp(0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8921, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xffffffea) r3 = epoll_create(0xe29f) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigpending(&(0x7f0000000400), 0x8) ppoll(&(0x7f0000000140)=[{r3}, {r1}], 0x2, 0x0, &(0x7f0000000040), 0x8) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000440), 0xc, &(0x7f00000005c0)={&(0x7f00000007c0)=ANY=[]}}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) close(r2) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000040), 0x4) r4 = shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffa000/0x4000)=nil) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) shmctl$SHM_STAT(r4, 0xd, &(0x7f0000000200)=""/55) getrandom(&(0x7f0000000180)=""/102, 0x66, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r5, &(0x7f0000000080), 0x297ef) socket$inet6_udp(0xa, 0x2, 0x0) 03:54:56 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000300)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000000), 0x4) 03:54:56 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) [ 1836.182902] audit: type=1326 audit(2000001296.818:1434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2243 comm="syz-executor0" exe="/root/syz-executor0" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0x0 [ 1836.218038] hfsplus: unable to find HFS+ superblock 03:54:56 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:54:56 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480)=""/146, &(0x7f0000000540)=0x92) personality(0x5000004) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000efd000)=0x62) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000fddfff)) write$FUSE_ENTRY(r0, &(0x7f0000000a00)={0x90, 0x0, 0x0, {0x0, 0x1, 0x0, 0x8001, 0x0, 0x0, {0x2, 0xf1e, 0x0, 0x0, 0x0, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}}}, 0x90) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x1eb) r1 = shmat(0xffffffffffffffff, &(0x7f0000ffe000/0x1000)=nil, 0x1000) shmdt(r1) r2 = creat(&(0x7f0000000800)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000740)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) set_robust_list(&(0x7f0000000140)={0x0, 0x5}, 0x18) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000000000)={0xffff, 0x4, 0x3, 0xffffffff, 0xfffffffffffffff7, 0x1f}) keyctl$reject(0x13, 0x0, 0x3, 0xd553, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=""/191, &(0x7f00000001c0)=0xffffffffffffff29) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, &(0x7f0000000240)=""/73, &(0x7f0000000100)=0x49) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000180)) 03:54:56 executing program 1: clone(0x20040200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) r1 = syz_open_procfs(0x0, &(0x7f0000000280)="636c6561725f7265667300b04978e60c4ba32fd7b949714bcbe80c57af59747c61a31619cbafea034f5b6bb15332860b9f14c654d1012484f5c9d8edcad2f073e0ca5078fc64d38d1e297b9d66a71452b92cae675696216e08f21e87b8b54da0d1b5f3b4d6f8caf34a15ed2b2c98fcbf581297b31beafaffb76778a196ad93aa3d2d7a06720827") r2 = syz_open_procfs(0x0, &(0x7f0000000440)='syscall\x00') sendfile(r1, r2, 0x0, 0x1) stat(0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x1000000000015) open$dir(&(0x7f0000000200)='./file0\x00', 0x27e, 0x0) [ 1836.296844] hfsplus: unable to find HFS+ superblock 03:54:57 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:54:57 executing program 4: syz_emit_ethernet(0x300606, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300003, 0x0, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff83, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4888], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 03:54:57 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffdfc, 0x0) 03:54:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000bc0)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'bridge0\x00', @random="01003a1e2410"}) 03:54:57 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:54:57 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2b6d656d6f727920fdb061b72b8367a48838b419f78333f46c07eb233fc812ad62104f77530b07abdddf27c1f3cf9d0d7df3e4b2cef3670b43ebe31700060cf6625d13"], 0x43) 03:54:57 executing program 0: seccomp(0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8921, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xffffffea) r3 = epoll_create(0xe29f) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigpending(&(0x7f0000000400), 0x8) ppoll(&(0x7f0000000140)=[{r3}, {r1}], 0x2, 0x0, &(0x7f0000000040), 0x8) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000440), 0xc, &(0x7f00000005c0)={&(0x7f00000007c0)=ANY=[]}}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) close(r2) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000040), 0x4) r4 = shmget(0x0, 0x4000, 0x54000000, &(0x7f0000ffa000/0x4000)=nil) pipe2(&(0x7f0000000240), 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) shmctl$SHM_STAT(r4, 0xd, &(0x7f0000000200)=""/55) getrandom(&(0x7f0000000180)=""/102, 0x66, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r5, &(0x7f0000000080), 0x297ef) socket$inet6_udp(0xa, 0x2, 0x0) 03:54:57 executing program 4: syz_emit_ethernet(0x300606, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300003, 0x0, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff83, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4888], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 03:54:57 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x900000000000000, 0x0) 03:54:57 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:54:57 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) 03:54:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000bc0)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'bridge0\x00', @random="01003a1e2410"}) 03:54:57 executing program 4: syz_emit_ethernet(0x300606, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300003, 0x0, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff83, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4888], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 1837.038670] audit: type=1326 audit(2000001297.668:1435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2313 comm="syz-executor0" exe="/root/syz-executor0" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0x0 03:54:57 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:54:57 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@random={'user.', 'fd'}, &(0x7f0000000480)=""/234, 0xea) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) 03:54:57 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x600000000000000, 0x0) 03:54:57 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x0, 0x0) dup2(r0, r1) 03:54:57 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='ns\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000540)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00000000c0)) syz_open_pts(r1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x1e9, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000200)={0x0, r4+30000000}, &(0x7f0000000300)={&(0x7f0000000080), 0x8}) futimesat(r0, 0x0, 0x0) vmsplice(r2, 0x0, 0x0, 0x0) 03:54:58 executing program 0: 03:54:58 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:54:58 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x0) sendfile(r0, r1, 0x0, 0x2000005) 03:54:58 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x482b000000000000, 0x0) 03:54:58 executing program 1: 03:54:58 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:54:58 executing program 0: 03:54:58 executing program 1: 03:54:58 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x60000000, 0x0) 03:54:58 executing program 0: 03:54:58 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) [ 1838.189127] hfsplus: unable to find HFS+ superblock 03:54:58 executing program 4: 03:54:58 executing program 2: 03:54:58 executing program 1: 03:54:58 executing program 0: 03:54:58 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) [ 1838.234342] hfsplus: unable to find HFS+ superblock 03:54:58 executing program 1: 03:54:58 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x4, 0x0) 03:54:59 executing program 0: 03:54:59 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:54:59 executing program 2: 03:54:59 executing program 4: 03:54:59 executing program 0: [ 1838.431995] hfsplus: unable to find HFS+ superblock 03:54:59 executing program 2: 03:54:59 executing program 1: 03:54:59 executing program 4: 03:54:59 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) [ 1838.527797] hfsplus: unable to find HFS+ superblock 03:54:59 executing program 2: 03:54:59 executing program 0: 03:54:59 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x6b6b6b00, 0x0) 03:54:59 executing program 1: 03:54:59 executing program 4: 03:54:59 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:54:59 executing program 2: 03:54:59 executing program 0: 03:54:59 executing program 1: 03:54:59 executing program 2: 03:54:59 executing program 4: 03:54:59 executing program 0: 03:54:59 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xedc000000000, 0x0) 03:54:59 executing program 1: 03:54:59 executing program 2: 03:54:59 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:54:59 executing program 4: 03:54:59 executing program 0: 03:54:59 executing program 2: 03:54:59 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x200000000000000, 0x0) 03:54:59 executing program 1: 03:54:59 executing program 4: 03:54:59 executing program 2: 03:54:59 executing program 1: 03:54:59 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:54:59 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2300000000000000, 0x0) 03:54:59 executing program 4: 03:54:59 executing program 0: 03:54:59 executing program 2: 03:54:59 executing program 1: 03:54:59 executing program 4: 03:55:00 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:00 executing program 1: 03:55:00 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xa000000, 0x0) 03:55:00 executing program 0: 03:55:00 executing program 2: 03:55:00 executing program 4: [ 1839.452471] hfsplus: unable to find HFS+ superblock 03:55:00 executing program 0: 03:55:00 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:00 executing program 1: [ 1839.561961] hfsplus: unable to find HFS+ superblock 03:55:00 executing program 4: 03:55:00 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) read(r0, 0x0, 0x0) 03:55:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) sendfile(r0, r1, 0x0, 0x10000) ftruncate(0xffffffffffffffff, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xffffffffffffff62) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x6, 0x3, 0x0, 0x101, 0x3, 0x7, 0x7fffffff, 0x16e, 0x38, 0x126, 0x5, 0x0, 0x20, 0x1, 0x9}, [{0x1, 0x1, 0x246, 0x20, 0x6, 0x5c68}], "6bfd40de636e6316156af4a6643fcd31a8bdaa0b0bedc0a06319d6627f3aae1445feb4ee4440d0c728aa4c728a94a7e1044ed6f0e189b6dd699da98ec6c9f32747fa2b05cc9f7bce43d54f271906a3e3a14db9152c3192a322d1078ddb1d1acdc34cc552d3bd678974c771e0ed42d5f28f5d1f88", [[], [], [], [], [], []]}, 0x6cc) 03:55:00 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000080)={0x0, 0x3ff, 0x0, 0xd44c}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 03:55:00 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000000000000, 0x0) 03:55:00 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0xe) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000)="f5", 0x0}, 0x20) [ 1839.720594] audit: type=1800 audit(2000001300.359:1436): pid=2527 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor2" name="file0" dev="sda1" ino=16941 res=0 03:55:00 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r1, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:00 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/152, 0x98) 03:55:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.ima\x00', 0x0, 0x0, 0x0) 03:55:00 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f00000005c0)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x1, 0x6}}, 0x50) 03:55:00 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xe0000, 0x0) [ 1839.839456] audit: type=1804 audit(2000001300.359:1437): pid=2527 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir288573520/syzkaller.3cLy35/44/file0" dev="sda1" ino=16941 res=1 03:55:00 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r1, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:00 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @cond}, {0x0, 0x0, 0x0, {}, {}, @cond}}) 03:55:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfff}}, 0x30) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) 03:55:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) sendfile(r0, r1, 0x0, 0x10000) ftruncate(0xffffffffffffffff, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xffffffffffffff62) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x6, 0x3, 0x0, 0x101, 0x3, 0x7, 0x7fffffff, 0x16e, 0x38, 0x126, 0x5, 0x0, 0x20, 0x1, 0x9}, [{0x1, 0x1, 0x246, 0x20, 0x6, 0x5c68}], "6bfd40de636e6316156af4a6643fcd31a8bdaa0b0bedc0a06319d6627f3aae1445feb4ee4440d0c728aa4c728a94a7e1044ed6f0e189b6dd699da98ec6c9f32747fa2b05cc9f7bce43d54f271906a3e3a14db9152c3192a322d1078ddb1d1acdc34cc552d3bd678974c771e0ed42d5f28f5d1f88", [[], [], [], [], [], []]}, 0x6cc) 03:55:01 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r1, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:01 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) statfs(0x0, 0x0) memfd_create(0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) read(r0, 0x0, 0x0) 03:55:01 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='attr/fscreate\x00') writev(r0, &(0x7f0000000040)=[{&(0x7f00000002c0)='\x00', 0x1}], 0x1) 03:55:01 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000180)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}}) 03:55:01 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x48000000, 0x0) [ 1840.440293] audit: type=1804 audit(2000001301.080:1438): pid=2535 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir288573520/syzkaller.3cLy35/44/file0" dev="sda1" ino=16941 res=1 03:55:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) sendfile(r0, r1, 0x0, 0x10000) ftruncate(0xffffffffffffffff, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xffffffffffffff62) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x6, 0x3, 0x0, 0x101, 0x3, 0x7, 0x7fffffff, 0x16e, 0x38, 0x126, 0x5, 0x0, 0x20, 0x1, 0x9}, [{0x1, 0x1, 0x246, 0x20, 0x6, 0x5c68}], "6bfd40de636e6316156af4a6643fcd31a8bdaa0b0bedc0a06319d6627f3aae1445feb4ee4440d0c728aa4c728a94a7e1044ed6f0e189b6dd699da98ec6c9f32747fa2b05cc9f7bce43d54f271906a3e3a14db9152c3192a322d1078ddb1d1acdc34cc552d3bd678974c771e0ed42d5f28f5d1f88", [[], [], [], [], [], []]}, 0x6cc) 03:55:01 executing program 1: clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4205, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) 03:55:01 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) [ 1840.594032] hfsplus: unable to find HFS+ superblock [ 1840.620818] audit: type=1800 audit(2000001301.240:1439): pid=2592 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor2" name="file0" dev="sda1" ino=17538 res=0 03:55:01 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) poll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0) [ 1840.678203] hfsplus: unable to find HFS+ superblock 03:55:01 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) [ 1840.726772] audit: type=1804 audit(2000001301.270:1440): pid=2596 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir288573520/syzkaller.3cLy35/45/file0" dev="sda1" ino=17538 res=1 03:55:01 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2200, 0x0) [ 1840.904051] audit: type=1800 audit(2000001301.470:1441): pid=2605 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=17559 res=0 03:55:01 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f00000001c0)=r0) 03:55:01 executing program 1: fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x8, 0x549, 0x20000000000001, 0x0, 0x0}, 0x2c) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x189000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f00000001c0)=""/221) r2 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_timeval(r2, 0x1, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) ioctl$TIOCMBIS(r3, 0x5416, &(0x7f0000000300)) connect$inet6(r2, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r2, &(0x7f00000002c0), 0x4cc, 0xfff6) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'ip6tnl0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000180)={@mcast1, 0x36, r4}) 03:55:02 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, 0x0) syz_open_procfs(0x0, 0x0) statfs(0x0, 0x0) memfd_create(0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) read(r0, 0x0, 0x0) 03:55:02 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) sendfile(r0, r1, 0x0, 0x10000) ftruncate(0xffffffffffffffff, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xffffffffffffff62) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x6, 0x3, 0x0, 0x101, 0x3, 0x7, 0x7fffffff, 0x16e, 0x38, 0x126, 0x5, 0x0, 0x20, 0x1, 0x9}, [{0x1, 0x1, 0x246, 0x20, 0x6, 0x5c68}], "6bfd40de636e6316156af4a6643fcd31a8bdaa0b0bedc0a06319d6627f3aae1445feb4ee4440d0c728aa4c728a94a7e1044ed6f0e189b6dd699da98ec6c9f32747fa2b05cc9f7bce43d54f271906a3e3a14db9152c3192a322d1078ddb1d1acdc34cc552d3bd678974c771e0ed42d5f28f5d1f88", [[], [], [], [], [], []]}, 0x6cc) 03:55:02 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x10d, 0x0) 03:55:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@random={'user.', 'fd'}, 0x0, 0x0) [ 1841.457172] hfsplus: unable to find HFS+ superblock 03:55:02 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) socket$inet6(0xa, 0x803, 0x3) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r1, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) [ 1841.517888] hfsplus: unable to find HFS+ superblock [ 1841.584763] audit: type=1800 audit(2000001302.220:1442): pid=2653 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=17539 res=0 03:55:02 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x9, 0x0) 03:55:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) fadvise64(r1, 0x0, 0x0, 0x1) sendfile(r0, r1, 0x0, 0x10000) ftruncate(0xffffffffffffffff, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xffffffffffffff62) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x6, 0x3, 0x0, 0x101, 0x3, 0x7, 0x7fffffff, 0x16e, 0x38, 0x126, 0x5, 0x0, 0x20, 0x1, 0x9}, [{0x1, 0x1, 0x246, 0x20, 0x6, 0x5c68}], "6bfd40de636e6316156af4a6643fcd31a8bdaa0b0bedc0a06319d6627f3aae1445feb4ee4440d0c728aa4c728a94a7e1044ed6f0e189b6dd699da98ec6c9f32747fa2b05cc9f7bce43d54f271906a3e3a14db9152c3192a322d1078ddb1d1acdc34cc552d3bd678974c771e0ed42d5f28f5d1f88", [[], [], [], [], [], []]}, 0x6cc) 03:55:02 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) socket$inet6(0xa, 0x803, 0x3) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r1, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) [ 1841.797449] hfsplus: unable to find HFS+ superblock [ 1841.910312] hfsplus: unable to find HFS+ superblock 03:55:02 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x68, 0x0) 03:55:02 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) socket$inet6(0xa, 0x803, 0x3) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r1, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) [ 1841.987170] audit: type=1800 audit(2000001302.620:1443): pid=2674 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=17579 res=0 03:55:02 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000004c0)=""/246) 03:55:03 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 03:55:03 executing program 0: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mknod(&(0x7f0000000140)='./file0\x00', 0xffc, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000000c0)=""/54) sendmsg$nl_netfilter(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000040)={0x20, 0x0, 0x1, 0x800000001, 0x0, 0x0, {0xa}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) execve(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 03:55:03 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r1, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:03 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x6c00000000000000, 0x0) 03:55:03 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x400000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f0000000280)=ANY=[@ANYRES64], 0xffd1) read(r0, &(0x7f0000000080)=""/165, 0xa5) 03:55:03 executing program 2: r0 = gettid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpgid(r0) 03:55:03 executing program 4: syz_mount_image$msdos(&(0x7f0000000140)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:55:03 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r1, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) [ 1842.448452] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 03:55:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") splice(r0, 0x0, r0, 0x0, 0x6, 0x0) 03:55:03 executing program 2: syz_genetlink_get_family_id$nbd(0x0) 03:55:03 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xe, 0x0) 03:55:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fsetxattr$system_posix_acl(r0, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000200)={{}, {}, [], {}, [{0x8, 0x1}, {}, {0x8, 0x6}, {}]}, 0x44, 0x0) 03:55:03 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r1, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) [ 1842.613520] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 03:55:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000001c0)={'security\x00'}, 0x0) [ 1842.731716] hfsplus: unable to find HFS+ superblock 03:55:03 executing program 4: kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 03:55:03 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x3, 0x0) [ 1842.790640] hfsplus: unable to find HFS+ superblock 03:55:03 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:55:03 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:03 executing program 0: 03:55:03 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff7f, 0x0) 03:55:03 executing program 4: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) 03:55:03 executing program 2: r0 = getpgrp(0xffffffffffffffff) kcmp(r0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 03:55:04 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x4c00, 0x0) 03:55:04 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000280)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @empty}, @igmp={0x0, 0x0, 0x0, @multicast2}}}}}, 0x0) syz_emit_ethernet(0x11, &(0x7f0000000080)={@empty, @broadcast, [], {@x25}}, 0x0) 03:55:04 executing program 2: timer_create(0x0, 0x0, &(0x7f0000000080)) timer_gettime(0x0, 0x0) 03:55:04 executing program 4: 03:55:04 executing program 0: 03:55:04 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:04 executing program 4: 03:55:04 executing program 1: 03:55:04 executing program 2: 03:55:04 executing program 0: [ 1843.568472] hfsplus: unable to find HFS+ superblock 03:55:04 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) [ 1843.636685] hfsplus: unable to find HFS+ superblock 03:55:04 executing program 1: 03:55:04 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x900, 0x0) 03:55:04 executing program 0: 03:55:04 executing program 2: 03:55:04 executing program 4: 03:55:04 executing program 5: memfd_create(0x0, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) [ 1843.770928] hfsplus: unable to find HFS+ superblock 03:55:04 executing program 1: 03:55:04 executing program 2: [ 1843.840995] hfsplus: unable to find HFS+ superblock 03:55:04 executing program 0: 03:55:04 executing program 4: 03:55:04 executing program 1: 03:55:04 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a0ffffffff, 0x0) 03:55:04 executing program 5: memfd_create(0x0, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:04 executing program 0: 03:55:04 executing program 2: 03:55:04 executing program 4: 03:55:04 executing program 1: 03:55:04 executing program 0: 03:55:04 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x4858, 0x0) 03:55:04 executing program 5: memfd_create(0x0, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:04 executing program 2: 03:55:04 executing program 4: 03:55:04 executing program 1: [ 1844.161943] hfsplus: unable to find HFS+ superblock 03:55:04 executing program 0: 03:55:04 executing program 2: 03:55:04 executing program 1: [ 1844.249865] hfsplus: unable to find HFS+ superblock 03:55:04 executing program 4: 03:55:04 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:05 executing program 0: 03:55:05 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xa00, 0x0) 03:55:05 executing program 1: 03:55:05 executing program 2: 03:55:05 executing program 4: 03:55:05 executing program 0: [ 1844.467031] hfsplus: unable to find HFS+ superblock 03:55:05 executing program 1: 03:55:05 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:05 executing program 4: 03:55:05 executing program 2: [ 1844.565629] hfsplus: unable to find HFS+ superblock 03:55:05 executing program 0: 03:55:05 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:55:05 executing program 1: 03:55:05 executing program 4: 03:55:05 executing program 2: 03:55:05 executing program 0: 03:55:05 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:05 executing program 4: 03:55:05 executing program 1: 03:55:05 executing program 2: 03:55:05 executing program 0: 03:55:05 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x7a, 0x0) 03:55:05 executing program 2: 03:55:05 executing program 1: 03:55:05 executing program 4: 03:55:05 executing program 0: 03:55:05 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:05 executing program 2: syz_execute_func(&(0x7f00000000c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") ptrace$getenv(0x4201, 0x0, 0x0, 0x0) 03:55:05 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff, 0x0) 03:55:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) write$P9_RLOCK(r1, 0x0, 0xf6) 03:55:05 executing program 4: syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 03:55:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000240), 0x1c) r1 = dup2(r0, r0) syz_execute_func(&(0x7f0000000280)="3666440f50f564ff0941c3c401f82ebd92823dcfc4c27d794e0066420fe2e3660fa041d288766d00006f") sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 03:55:05 executing program 2: r0 = epoll_create1(0x0) write$binfmt_elf32(r0, 0x0, 0x0) 03:55:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r1 = dup2(r0, r0) syz_execute_func(&(0x7f0000000280)="3666440f50f564ff0941c3c401f82ebd92823dcfc4c27d794e0066420fe2e3660fa041d288766d00006f") sendto$unix(r1, 0x0, 0x0, 0x20004000, &(0x7f0000000600)=@abs, 0x6e) 03:55:05 executing program 4: shmctl$IPC_RMID(0x0, 0x0) 03:55:05 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:05 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) shutdown(r0, 0x0) 03:55:05 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x700000000000000, 0x0) 03:55:05 executing program 0: syz_execute_func(&(0x7f0000000180)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") removexattr(&(0x7f0000000040)='./file0\x00', 0x0) 03:55:06 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x3400000000000000, 0x0) 03:55:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/fib_trie\x00') ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f00000001c0)) 03:55:06 executing program 4: syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") ioperm(0x0, 0x81e, 0xd5) 03:55:06 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) r1 = dup2(r0, r0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, 0x0, 0x0) 03:55:06 executing program 0: 03:55:06 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) connect$inet(r0, &(0x7f0000000180), 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@window, @sack_perm, @window, @mss], 0x20000000000000c9) 03:55:06 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:06 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe2(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendfile(r1, r0, 0x0, 0x0) 03:55:06 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) [ 1845.537158] audit: type=1400 audit(2000001306.182:1444): avc: denied { setopt } for pid=3009 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 03:55:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, 0x0, &(0x7f00000003c0)) 03:55:06 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x7a000000, 0x0) 03:55:06 executing program 0: syz_execute_func(&(0x7f0000000140)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e00f3430f6f303e0e11d042f46d9dcccc6f") ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) 03:55:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/igmp6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:55:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="636c6561725f72656673007edb") writev(r0, &(0x7f0000000100)=[{&(0x7f0000000180)='4', 0x1}], 0x1) utimes(0x0, 0x0) 03:55:06 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r1, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) [ 1845.726441] hfsplus: unable to find HFS+ superblock 03:55:06 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000100)='projid_map\x00') sendfile(r1, r0, 0x0, 0x8) 03:55:06 executing program 2: semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x1800}], 0x1, 0x0) 03:55:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="636c6561725f72656673007edb") writev(r0, &(0x7f0000000100)=[{&(0x7f0000000180)='4', 0x1}], 0x1) ftruncate(r0, 0x0) [ 1845.812418] hfsplus: unable to find HFS+ superblock 03:55:06 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x2081fc) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000100)={0x0, 0x2, 0x0, 0x10000}) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fcntl$setstatus(r3, 0x4, 0x40400) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x261c41ec}) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x101) fsync(r3) write$FUSE_WRITE(r3, &(0x7f0000000140)={0xfffffffffffffd29}, 0x18) 03:55:06 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r1, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:06 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xd01, 0x0) 03:55:06 executing program 2: r0 = socket$inet6(0xa, 0x1000002000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x0, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@remote, 0x800, 0x0, 0x103}, 0x20) 03:55:06 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x811, 0x0, @dev, @remote}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)={0x0, 0x5, [0x0, 0x57]}) 03:55:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="000000000000000014000300690936677265746170300000800000005bc6a72d8a43f590bd3c5769fde92a0a657046559fda7826568f4ff072ac52f6373763876b90c0d1dbe2f54bd619289331b3fba897b338c44b292845e080912105aeaf596a8dce838d841000faec2db13c058c1b67733e11212e406614c980ab82e974d190bbf5d0f03584d22c9bff30454a77ffb4a97ae00bc0c6a7660410da6752014927889884f7c757feef93dc5ca6cea2b404"], 0x1}}, 0x0) [ 1846.000947] hfsplus: unable to find HFS+ superblock 03:55:06 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000040)="2e0000001800810ee00f80ecdb4cb9c00a480e181e0cd308e8bd6efb120009000e00db1b0200000006000500fe80", 0x2e}], 0x1}, 0x0) 03:55:06 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) 03:55:06 executing program 0: bind$alg(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x3, 0x1, 0x7ff) socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f0000007540)) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x4e20, @loopback}, {0x306, @broadcast}, 0x40, {0x2, 0x4e23, @local}, 'lo\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f000000e5c0)=[{{0x0, 0x0, &(0x7f0000007600)=[{&(0x7f0000007580)=""/86, 0x56}], 0x1, &(0x7f0000007640)=""/26, 0x1a}, 0x1ff}, {{0x0, 0x0, &(0x7f0000009780)=[{&(0x7f0000007680)=""/238, 0xee}, {&(0x7f0000007780)=""/4096, 0x1000}, {&(0x7f0000008780)=""/4096, 0x1000}], 0x3}, 0xfffffffffffffffc}, {{&(0x7f00000097c0)=@ethernet={0x0, @dev}, 0x80, &(0x7f000000ab00)=[{&(0x7f0000009840)=""/4096, 0x1000}, {&(0x7f000000a840)=""/102, 0x66}, {&(0x7f000000a8c0)=""/250, 0xfa}, {&(0x7f000000a9c0)=""/159, 0x9f}, {&(0x7f000000aa80)=""/65, 0x41}], 0x5, &(0x7f000000ab80)=""/215, 0xd7}, 0x1}, {{&(0x7f000000ac80)=@ipx, 0x80, &(0x7f000000ad80)=[{&(0x7f000000ad00)=""/100, 0x64}], 0x1, &(0x7f000000adc0)=""/10, 0xa}, 0x4}, {{&(0x7f000000ae00)=@can, 0x80, &(0x7f000000b080)=[{&(0x7f000000ae80)=""/65, 0x41}, {&(0x7f000000af00)=""/125, 0x7d}, {&(0x7f000000af80)=""/128, 0x80}, {&(0x7f000000b000)=""/109, 0x6d}], 0x4}, 0x1000}, {{&(0x7f000000b0c0)=@generic, 0x80, &(0x7f000000b200)=[{&(0x7f000000b140)=""/2, 0x2}, {&(0x7f000000b180)=""/77, 0x4d}], 0x2, &(0x7f000000b240)=""/194, 0xc2}, 0x75161bfd}, {{&(0x7f000000b340)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f000000b740)=[{&(0x7f000000b3c0)=""/85, 0x55}, {&(0x7f000000b440)=""/25, 0x19}, {&(0x7f000000b480)=""/184, 0xb8}, {&(0x7f000000b540)=""/66, 0x42}, {&(0x7f000000b5c0)=""/143, 0x8f}, {&(0x7f000000b680)=""/149, 0x95}], 0x6, &(0x7f000000b7c0)=""/162, 0xa2}, 0x6}, {{&(0x7f000000b880)=@tipc, 0x80, &(0x7f000000cd40)=[{&(0x7f000000b900)=""/235, 0xeb}, {&(0x7f000000ba00)=""/138, 0x8a}, {&(0x7f000000bac0)=""/104, 0x68}, {&(0x7f000000bb40)=""/117, 0x75}, {&(0x7f000000bbc0)=""/4096, 0x1000}, {&(0x7f000000cbc0)=""/168, 0xa8}, {&(0x7f000000cc80)=""/145, 0x91}], 0x7, &(0x7f000000cdc0)=""/37, 0x25}, 0x8}, {{0x0, 0x0, &(0x7f000000e240)=[{&(0x7f000000ce00)=""/49, 0x31}, {&(0x7f000000ce40)=""/200, 0xc8}, {&(0x7f000000cf40)=""/82, 0x52}, {&(0x7f000000cfc0)=""/158, 0x9e}, {&(0x7f000000d080)=""/86, 0x56}, {&(0x7f000000d100)=""/108, 0x6c}, {&(0x7f000000d180)=""/4096, 0x1000}, {&(0x7f000000e180)=""/90, 0x5a}, {&(0x7f000000e200)=""/8, 0x8}], 0x9, &(0x7f000000e300)=""/23, 0x17}, 0xbfcc}, {{&(0x7f000000e340)=@nl=@unspec, 0x80, &(0x7f000000e580)=[{&(0x7f000000e3c0)=""/255, 0xff}, {&(0x7f000000e4c0)=""/161, 0xa1}], 0x2}, 0x6}], 0xa, 0x12042, 0x0) accept$alg(r1, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000005c0)='pids.events\x00', 0x0, 0x0) setsockopt$inet6_dccp_int(r2, 0x21, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)="68756765746c04000000000500000000000087563255752c377a580072af114820", 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000340)={0x20}) write$cgroup_int(r3, &(0x7f0000000000), 0x10000002b) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="6367706f75702e6576656e7473003ea55e10a8299d73ee6d72da86f4dbed2f19b52a48a90e618729894c918a4985eb8f6f2c31681f988720c1753c87f13d0361b825fe2f4ac4ad9edbd55eebfe0cee240ff894a14ae0ebe6c841b49bedc14402a1528815b5af7235f0efcee6b1cba8728161d61a1ab8a917c2b5", 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380), 0x10076) setsockopt$sock_int(r3, 0x1, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000001300)={0x288000f, r3, 0x0, 0x8}) socket$inet_udplite(0x2, 0x2, 0x88) 03:55:06 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r1, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) [ 1846.087639] hfsplus: unable to find HFS+ superblock 03:55:06 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00, 0x0) 03:55:06 executing program 1: timer_create(0x0, &(0x7f00000005c0)={0x0, 0x12}, &(0x7f0000000580)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_settime(0x0, 0x0, 0x0, &(0x7f00000000c0)) 03:55:06 executing program 4: write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0xda4fff08) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000100)="766574000000000000000000bd6200") 03:55:06 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@remote}, 0x0, @in=@multicast2}}, 0xe4) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) sendmsg$key(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x16, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB="02120100020000000000000000000000"], 0x10}}, 0x0) 03:55:06 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[{0x18, 0x1, 0x1, "01"}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000140)={&(0x7f0000000240)=@can, 0x4c4, &(0x7f0000000180), 0x0, 0xfffffffffffffffe, 0xe2}, 0x0) 03:55:07 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:07 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x5, 0x0) 03:55:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={0x0, &(0x7f0000000400)=""/214, 0x100000, 0xd6, 0x1}, 0x20) 03:55:07 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) [ 1846.564958] hfsplus: unable to find HFS+ superblock [ 1846.636043] hfsplus: unable to find HFS+ superblock 03:55:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x72, 0xa, 0xffc2}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x1, 0xc3, &(0x7f0000000000)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd13c1c00]}, 0x48) 03:55:07 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:07 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB='\x00'], 0x1) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xa4e9dde3) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 03:55:07 executing program 4: r0 = socket$inet6(0xa, 0x10000000000001, 0x0) r1 = socket$inet6(0xa, 0x803, 0x20) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000580)=0x3ff, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 03:55:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={0x0, &(0x7f0000000400)=""/214, 0x100000, 0xd6, 0x1}, 0x20) 03:55:07 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0) 03:55:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={0x0, &(0x7f0000000400)=""/214, 0x100000, 0xd6, 0x1}, 0x20) 03:55:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x3, 0x430, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000840], 0x0, 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"]}, 0x4a8) 03:55:07 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:07 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) close(r0) 03:55:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={0x0, &(0x7f0000000400)=""/214, 0x100000, 0xd6, 0x1}, 0x20) 03:55:07 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x6800000000000000, 0x0) 03:55:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 03:55:08 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendto(r2, &(0x7f0000000080)='t', 0x1, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) [ 1847.340854] xt_helper: cannot load conntrack support for proto=7 03:55:08 executing program 2: 03:55:08 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:08 executing program 4: 03:55:08 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000000000, 0x0) 03:55:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 03:55:08 executing program 0: 03:55:08 executing program 0: 03:55:08 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:08 executing program 4: 03:55:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 03:55:08 executing program 2: 03:55:08 executing program 0: 03:55:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 03:55:08 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xff0f0000, 0x0) 03:55:08 executing program 4: 03:55:08 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:08 executing program 2: 03:55:08 executing program 0: 03:55:08 executing program 4: 03:55:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 03:55:08 executing program 2: 03:55:08 executing program 0: 03:55:08 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x482b0000, 0x0) 03:55:08 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:08 executing program 4: 03:55:09 executing program 2: 03:55:09 executing program 0: 03:55:09 executing program 4: 03:55:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 03:55:09 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x42440000, 0x0) 03:55:09 executing program 0: 03:55:09 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:09 executing program 2: 03:55:09 executing program 4: 03:55:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={0x0, &(0x7f0000000400)=""/214, 0x100000, 0xd6}, 0x20) 03:55:09 executing program 0: 03:55:09 executing program 2: 03:55:09 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={0x0, &(0x7f0000000400)=""/214, 0x100000, 0xd6}, 0x20) 03:55:09 executing program 4: 03:55:09 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x23000000, 0x0) 03:55:09 executing program 2: 03:55:09 executing program 4: 03:55:09 executing program 0: [ 1848.766518] hfsplus: unable to find HFS+ superblock 03:55:09 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:09 executing program 0: 03:55:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={0x0, &(0x7f0000000400)=""/214, 0x100000, 0xd6}, 0x20) 03:55:09 executing program 4: 03:55:09 executing program 2: [ 1848.856350] hfsplus: unable to find HFS+ superblock 03:55:09 executing program 2: 03:55:09 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:09 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xd00, 0x0) 03:55:09 executing program 1: 03:55:09 executing program 4: 03:55:09 executing program 0: 03:55:09 executing program 2: 03:55:09 executing program 1: 03:55:09 executing program 4: 03:55:09 executing program 0: [ 1849.117657] hfsplus: unable to find HFS+ superblock 03:55:09 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12628571") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:09 executing program 2: 03:55:09 executing program 4: 03:55:09 executing program 1: [ 1849.203576] hfsplus: unable to find HFS+ superblock 03:55:09 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x48, 0x0) 03:55:09 executing program 0: 03:55:09 executing program 2: 03:55:09 executing program 4: 03:55:10 executing program 1: 03:55:10 executing program 0: 03:55:10 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12628571") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:10 executing program 4: 03:55:10 executing program 2: [ 1849.430358] hfsplus: unable to find HFS+ superblock 03:55:10 executing program 1: 03:55:10 executing program 4: 03:55:10 executing program 0: [ 1849.538420] hfsplus: unable to find HFS+ superblock 03:55:10 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12628571") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:10 executing program 2: 03:55:10 executing program 4: 03:55:10 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000000, 0x0) 03:55:10 executing program 0: 03:55:10 executing program 1: 03:55:10 executing program 0: 03:55:10 executing program 2: 03:55:10 executing program 4: 03:55:10 executing program 1: 03:55:10 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c1262857180") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:10 executing program 0: 03:55:10 executing program 4: 03:55:10 executing program 2: 03:55:10 executing program 0: 03:55:10 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xff0f000000000000, 0x0) 03:55:10 executing program 1: 03:55:10 executing program 2: 03:55:10 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c1262857180") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:10 executing program 1: 03:55:10 executing program 0: 03:55:10 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)="636c6561725f72656673007edb") writev(r0, &(0x7f0000000100)=[{&(0x7f0000000180)='4', 0x1}], 0x1) syncfs(r0) 03:55:10 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={"6c6f000acc0000000000d80000002600"}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) sched_getattr(r1, &(0x7f0000000180), 0x30, 0x0) 03:55:10 executing program 0: mknod(&(0x7f0000000040)='./bus\x00', 0x8018, 0x5cd8) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000100)={0x4, 0xfffffffffffffffb, 0x7, 0x42, 0x5f6, 0x5, 0x1, 0x5}, &(0x7f0000000140)={0x3ff, 0x5}) 03:55:10 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x501002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0xfffffcea, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) add_key(&(0x7f0000000240)='logon\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000480)="8e4b4a9a6e5dbed021db5bd6b33e1f62059f3bcb68dc09cfbcdee3cae83530f34bb072b78ac3d277f314e05c23d80ef3432658966b610468ff371a8cebc6cad3ac810217ab4209", 0x47, 0xfffffffffffffffa) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc8fb47081025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd01e527e6fd3de45387daf7b1ac786d0e8a75e89046550fa2d2d25b60361fe06f308fe6033a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334", "7b8ddcc0c891591c4116893616105829576914e70bfed06d00f97c97644ab8a7"}) memfd_create(0x0, 0x1) ioctl$BLKGETSIZE64(r0, 0x80041272, &(0x7f0000000180)) 03:55:10 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff00000000, 0x0) 03:55:10 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c1262857180") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:10 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x9) 03:55:10 executing program 1: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) write(r0, &(0x7f00000006c0)="1f0000001e0007f1fff5ff0200000000000000040000dd00000003728d0417", 0x1f) 03:55:11 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x10, 0x0) [ 1850.416227] hfsplus: unable to find HFS+ superblock 03:55:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="636c6561725f72656673007edb") writev(r0, &(0x7f0000000100)=[{&(0x7f0000000180)='4', 0x1}], 0x1) fadvise64(r0, 0x0, 0x0, 0x0) 03:55:11 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) [ 1850.449917] syz-executor4 invoked oom-killer: gfp_mask=0x6200ca(GFP_HIGHUSER_MOVABLE), nodemask=(null), order=0, oom_score_adj=0 [ 1850.461974] netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. 03:55:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="636c6561725f72656673007edb") writev(r0, &(0x7f0000000100)=[{&(0x7f0000000180)='4', 0x1}], 0x1) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1850.502768] syz-executor4 cpuset=syz4 mems_allowed=0 [ 1850.522473] hfsplus: unable to find HFS+ superblock [ 1850.541617] CPU: 0 PID: 3511 Comm: syz-executor4 Not tainted 4.20.0-rc6+ #151 [ 1850.548929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1850.558735] Call Trace: [ 1850.561348] dump_stack+0x244/0x39d [ 1850.565010] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1850.570548] ? mark_held_locks+0x130/0x130 [ 1850.574809] ? mark_held_locks+0x130/0x130 [ 1850.579061] dump_header+0x27b/0xf72 [ 1850.582902] ? pagefault_out_of_memory+0x197/0x197 [ 1850.587849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1850.593393] ? check_preemption_disabled+0x48/0x280 [ 1850.598423] ? zap_class+0x640/0x640 03:55:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) clone(0x4082102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f0000000040)) [ 1850.602146] ? __lock_is_held+0xb5/0x140 [ 1850.606225] ? zap_class+0x640/0x640 [ 1850.609970] ? print_usage_bug+0xc0/0xc0 [ 1850.614041] ? find_held_lock+0x36/0x1c0 [ 1850.618114] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1850.623666] ? find_held_lock+0x36/0x1c0 [ 1850.627752] ? mark_held_locks+0xc7/0x130 [ 1850.631923] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1850.637029] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1850.642126] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1850.647111] ? trace_hardirqs_on+0xbd/0x310 [ 1850.651886] ? kasan_check_read+0x11/0x20 [ 1850.656025] ? ___ratelimit+0x3b4/0x672 [ 1850.659987] ? trace_hardirqs_off_caller+0x310/0x310 [ 1850.665079] ? trace_hardirqs_on+0x310/0x310 [ 1850.669478] ? lock_downgrade+0x900/0x900 [ 1850.673618] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1850.678709] ? ___ratelimit+0x3b9/0x672 [ 1850.682673] ? idr_get_free+0xf70/0xf70 [ 1850.686634] ? _raw_spin_unlock_irq+0x27/0x80 [ 1850.691115] ? _raw_spin_unlock_irq+0x27/0x80 [ 1850.695607] oom_kill_process.cold.27+0x10/0x903 [ 1850.700355] ? _raw_spin_unlock_irq+0x27/0x80 [ 1850.704839] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1850.709415] ? oom_evaluate_task+0x540/0x540 [ 1850.713811] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1850.719336] ? cgroup_procs_next+0x70/0x70 [ 1850.723563] ? _raw_spin_unlock_irq+0x60/0x80 [ 1850.728045] ? oom_badness+0xaa0/0xaa0 [ 1850.731940] ? mem_cgroup_scan_tasks+0x1c3/0x1e0 [ 1850.736686] ? mem_cgroup_iter_break+0x30/0x30 [ 1850.741276] ? mark_held_locks+0xc7/0x130 [ 1850.745415] out_of_memory+0xa84/0x1430 [ 1850.749498] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1850.754076] ? kasan_check_read+0x11/0x20 [ 1850.758214] ? oom_killer_disable+0x3a0/0x3a0 [ 1850.762722] mem_cgroup_out_of_memory+0x15e/0x210 [ 1850.767559] ? memory_oom_group_write+0x160/0x160 [ 1850.772392] ? mem_cgroup_try_charge+0x627/0xe20 [ 1850.777140] ? page_counter_try_charge+0x1c1/0x220 [ 1850.782062] try_charge+0xda9/0x1700 [ 1850.785765] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1850.790683] ? kasan_check_read+0x11/0x20 [ 1850.794823] ? mem_cgroup_from_task+0x1f0/0x1f0 [ 1850.799502] ? get_mem_cgroup_from_mm.part.62+0x221/0x880 [ 1850.805031] ? lock_page_memcg+0x350/0x350 [ 1850.809267] ? lock_acquire+0x1ed/0x520 [ 1850.813246] ? mem_cgroup_oom_control_write+0x100/0x100 [ 1850.818610] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1850.824137] ? check_preemption_disabled+0x48/0x280 [ 1850.829143] ? kasan_check_read+0x11/0x20 [ 1850.833278] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1850.838544] ? rcu_softirq_qs+0x20/0x20 [ 1850.842532] mem_cgroup_try_charge+0x627/0xe20 [ 1850.847103] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1850.852628] ? mem_cgroup_protected+0xa60/0xa60 [ 1850.857284] ? shmem_getattr+0x2c0/0x2c0 [ 1850.861361] ? mark_held_locks+0xc7/0x130 [ 1850.865497] ? print_usage_bug+0xc0/0xc0 [ 1850.869547] ? _raw_spin_unlock_irq+0x27/0x80 [ 1850.874026] ? _raw_spin_unlock_irq+0x27/0x80 [ 1850.878510] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1850.883080] ? print_usage_bug+0xc0/0xc0 [ 1850.887134] ? trace_hardirqs_off_caller+0x310/0x310 [ 1850.892240] mem_cgroup_try_charge_delay+0x1d/0xa0 [ 1850.897155] shmem_getpage_gfp+0x186b/0x4840 [ 1850.901558] ? shmem_add_to_page_cache+0x1950/0x1950 [ 1850.906665] ? mark_held_locks+0x130/0x130 [ 1850.910886] ? zap_class+0x640/0x640 [ 1850.914599] ? find_held_lock+0x36/0x1c0 [ 1850.918648] ? print_usage_bug+0xc0/0xc0 [ 1850.922707] ? __lock_acquire+0x62f/0x4c20 [ 1850.926945] ? find_held_lock+0x36/0x1c0 [ 1850.931001] ? mark_held_locks+0x130/0x130 [ 1850.935227] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1850.940156] ? mark_held_locks+0x130/0x130 [ 1850.944866] ? print_usage_bug+0xc0/0xc0 [ 1850.949113] ? zap_class+0x640/0x640 [ 1850.952815] ? lock_acquire+0x1ed/0x520 [ 1850.956775] ? alloc_set_pte+0x1447/0x1f40 [ 1850.960997] ? kasan_check_read+0x11/0x20 [ 1850.965127] ? do_raw_spin_lock+0x14f/0x350 [ 1850.969457] ? rwlock_bug.part.2+0x90/0x90 [ 1850.973677] ? __lock_is_held+0xb5/0x140 [ 1850.977734] ? _raw_spin_lock+0x35/0x40 [ 1850.981709] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1850.987244] ? alloc_set_pte+0xdee/0x1f40 [ 1850.991380] ? zap_class+0x640/0x640 [ 1850.995088] ? reacquire_held_locks+0x137/0x510 [ 1850.999743] ? alloc_set_pte+0x1447/0x1f40 [ 1851.003968] ? find_held_lock+0x13f/0x1c0 [ 1851.008108] ? filemap_map_pages+0xd6b/0x1a20 [ 1851.012590] ? lock_downgrade+0x900/0x900 [ 1851.016810] ? check_preemption_disabled+0x48/0x280 [ 1851.021813] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1851.026729] ? kasan_check_read+0x11/0x20 [ 1851.030865] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1851.036132] ? rcu_softirq_qs+0x20/0x20 [ 1851.040104] ? filemap_map_pages+0xd92/0x1a20 [ 1851.044599] ? find_get_entries_tag+0x1400/0x1400 [ 1851.049454] ? lock_downgrade+0x900/0x900 [ 1851.053598] ? do_raw_spin_unlock+0xa7/0x330 [ 1851.057992] ? do_raw_spin_trylock+0x270/0x270 [ 1851.062562] ? __pte_alloc_kernel+0x220/0x220 [ 1851.067045] ? __switch_to_asm+0x40/0x70 [ 1851.071109] ? __switch_to_asm+0x34/0x70 [ 1851.075164] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1851.080698] shmem_fault+0x25f/0x960 [ 1851.084404] ? zap_class+0x640/0x640 [ 1851.088113] ? shmem_read_mapping_page_gfp+0x1f0/0x1f0 [ 1851.093384] ? find_held_lock+0x36/0x1c0 [ 1851.097447] __do_fault+0x100/0x6b0 [ 1851.101062] ? lock_downgrade+0x900/0x900 [ 1851.105207] ? pmd_devmap_trans_unstable+0x220/0x220 [ 1851.110302] ? kasan_check_read+0x11/0x20 [ 1851.114469] ? do_raw_spin_unlock+0xa7/0x330 [ 1851.118890] ? do_raw_spin_trylock+0x270/0x270 [ 1851.123468] __handle_mm_fault+0x3ea6/0x5be0 [ 1851.127870] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1851.132722] ? __switch_to_asm+0x34/0x70 [ 1851.136767] ? __switch_to_asm+0x40/0x70 [ 1851.140811] ? __switch_to_asm+0x34/0x70 [ 1851.144856] ? __switch_to_asm+0x40/0x70 [ 1851.148914] ? __switch_to_asm+0x34/0x70 [ 1851.152960] ? __switch_to_asm+0x40/0x70 [ 1851.157004] ? __switch_to_asm+0x34/0x70 [ 1851.161052] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1851.166578] ? pmd_huge+0xf4/0x140 [ 1851.170114] ? zap_class+0x640/0x640 [ 1851.173810] ? zap_class+0x640/0x640 [ 1851.177518] ? find_held_lock+0x36/0x1c0 [ 1851.181576] ? handle_mm_fault+0x42a/0xc70 [ 1851.185800] ? lock_downgrade+0x900/0x900 [ 1851.189952] ? check_preemption_disabled+0x48/0x280 [ 1851.195044] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1851.200087] ? kasan_check_read+0x11/0x20 [ 1851.204233] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1851.209497] ? rcu_softirq_qs+0x20/0x20 [ 1851.213456] ? trace_hardirqs_off_caller+0x310/0x310 [ 1851.218546] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1851.224074] ? check_preemption_disabled+0x48/0x280 [ 1851.229083] handle_mm_fault+0x54f/0xc70 [ 1851.233137] ? __handle_mm_fault+0x5be0/0x5be0 [ 1851.237729] ? __get_user_pages+0xbc4/0x1ea0 [ 1851.242147] __get_user_pages+0xa3d/0x1ea0 [ 1851.246400] ? follow_page_mask+0x2160/0x2160 [ 1851.250897] ? vma_link+0x116/0x180 [ 1851.254518] ? ___perf_sw_event+0x51f/0x7c0 [ 1851.258833] ? zap_class+0x640/0x640 [ 1851.262535] ? rcu_softirq_qs+0x20/0x20 [ 1851.266513] ? lock_acquire+0x1ed/0x520 [ 1851.270477] ? __mm_populate+0x31a/0x4d0 [ 1851.274538] ? lock_release+0xa00/0xa00 [ 1851.278500] ? perf_trace_sched_process_exec+0x860/0x860 [ 1851.283959] populate_vma_page_range+0x2db/0x3d0 [ 1851.288739] ? follow_page+0x420/0x420 [ 1851.292628] ? find_vma+0x34/0x190 [ 1851.296155] __mm_populate+0x286/0x4d0 [ 1851.300039] ? populate_vma_page_range+0x3d0/0x3d0 [ 1851.305665] ? down_read_killable+0x150/0x150 [ 1851.310148] ? security_mmap_file+0x174/0x1b0 [ 1851.314636] vm_mmap_pgoff+0x27f/0x2c0 [ 1851.318526] ? vma_is_stack_for_current+0xd0/0xd0 [ 1851.323360] ? kasan_check_read+0x11/0x20 [ 1851.327495] ? _copy_to_user+0xc8/0x110 [ 1851.331458] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1851.336983] ksys_mmap_pgoff+0xf1/0x660 [ 1851.340944] ? do_syscall_64+0x9a/0x820 [ 1851.344907] ? find_mergeable_anon_vma+0xd0/0xd0 [ 1851.349648] ? trace_hardirqs_on+0xbd/0x310 [ 1851.353955] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1851.359477] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1851.364946] ? trace_hardirqs_off_caller+0x310/0x310 [ 1851.370044] __x64_sys_mmap+0xe9/0x1b0 [ 1851.373934] do_syscall_64+0x1b9/0x820 [ 1851.377808] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1851.383161] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1851.388097] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1851.392931] ? trace_hardirqs_on_caller+0x310/0x310 [ 1851.397933] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1851.402939] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1851.407952] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1851.412785] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1851.417961] RIP: 0033:0x457679 [ 1851.421153] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1851.440046] RSP: 002b:00007f2488b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 1851.447739] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000457679 03:55:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_execute_func(&(0x7f0000000000)="0faef24029450ff3440f1157f1ff9191c16a3e09092185d04e92d9f4c4610dc2900400000089150f6323230ff7c6") [ 1851.454996] RDX: 0000000000000003 RSI: 0000000000b36000 RDI: 0000000020000000 [ 1851.462252] RBP: 000000000072bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 1851.469510] R10: 0000000000008031 R11: 0000000000000246 R12: 00007f2488b2d6d4 [ 1851.476768] R13: 00000000004c2d5e R14: 00000000004d5098 R15: 00000000ffffffff [ 1851.490033] Task in /syz4 killed as a result of limit of /syz4 [ 1851.496067] memory: usage 307200kB, limit 307200kB, failcnt 739 [ 1851.545624] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1851.567529] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 03:55:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="636c6561725f72656673007edb") writev(r0, &(0x7f0000000100)=[{&(0x7f0000000180)='4', 0x1}], 0x1) signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 03:55:12 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xf5ffffff, 0x0) [ 1851.575560] Memory cgroup stats for /syz4: cache:4896KB rss:271356KB rss_huge:260096KB shmem:4784KB mapped_file:4884KB dirty:0KB writeback:0KB swap:0KB inactive_anon:4988KB active_anon:271356KB inactive_file:20KB active_file:4KB unevictable:4KB 03:55:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="636c6561725f72656673007edb") writev(r0, &(0x7f0000000100)=[{&(0x7f0000000180)='4', 0x1}], 0x1) poll(&(0x7f0000000000)=[{r0, 0x24}], 0x1, 0x0) 03:55:12 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) [ 1851.627602] Memory cgroup out of memory: Kill process 17358 (syz-executor4) score 1103 or sacrifice child [ 1851.649522] Killed process 17358 (syz-executor4) total-vm:70340kB, anon-rss:2192kB, file-rss:32768kB, shmem-rss:0kB [ 1851.782885] syz-executor4 invoked oom-killer: gfp_mask=0x6200ca(GFP_HIGHUSER_MOVABLE), nodemask=(null), order=0, oom_score_adj=0 [ 1851.796951] syz-executor4 cpuset=syz4 mems_allowed=0 [ 1851.808514] CPU: 1 PID: 3511 Comm: syz-executor4 Not tainted 4.20.0-rc6+ #151 [ 1851.815834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1851.825205] Call Trace: [ 1851.827817] dump_stack+0x244/0x39d [ 1851.831468] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1851.836697] ? mark_held_locks+0x130/0x130 [ 1851.840954] ? mark_held_locks+0x130/0x130 [ 1851.845207] dump_header+0x27b/0xf72 [ 1851.848953] ? pagefault_out_of_memory+0x197/0x197 [ 1851.853904] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1851.859461] ? check_preemption_disabled+0x48/0x280 [ 1851.864504] ? zap_class+0x640/0x640 [ 1851.868233] ? __lock_is_held+0xb5/0x140 [ 1851.872317] ? zap_class+0x640/0x640 [ 1851.876047] ? print_usage_bug+0xc0/0xc0 [ 1851.880125] ? find_held_lock+0x36/0x1c0 [ 1851.884213] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1851.889763] ? find_held_lock+0x36/0x1c0 [ 1851.893845] ? mark_held_locks+0xc7/0x130 [ 1851.898016] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1851.903128] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1851.908375] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1851.912970] ? trace_hardirqs_on+0xbd/0x310 [ 1851.917308] ? kasan_check_read+0x11/0x20 [ 1851.921487] ? ___ratelimit+0x3b4/0x672 [ 1851.925486] ? trace_hardirqs_off_caller+0x310/0x310 [ 1851.930612] ? trace_hardirqs_on+0x310/0x310 [ 1851.935032] ? lock_downgrade+0x900/0x900 [ 1851.939192] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1851.944300] ? ___ratelimit+0x3b9/0x672 [ 1851.948285] ? idr_get_free+0xf70/0xf70 [ 1851.952290] ? _raw_spin_unlock_irq+0x27/0x80 [ 1851.956795] ? _raw_spin_unlock_irq+0x27/0x80 [ 1851.961306] oom_kill_process.cold.27+0x10/0x903 [ 1851.966606] ? _raw_spin_unlock_irq+0x27/0x80 [ 1851.971113] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1851.975725] ? oom_evaluate_task+0x540/0x540 [ 1851.980152] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1851.985706] ? cgroup_procs_next+0x70/0x70 [ 1851.989956] ? _raw_spin_unlock_irq+0x60/0x80 [ 1851.994475] ? oom_badness+0xaa0/0xaa0 [ 1851.998380] ? mem_cgroup_scan_tasks+0x1c3/0x1e0 [ 1852.003155] ? mem_cgroup_iter_break+0x30/0x30 [ 1852.007761] ? mark_held_locks+0xc7/0x130 [ 1852.011924] out_of_memory+0xa84/0x1430 [ 1852.015905] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1852.020500] ? kasan_check_read+0x11/0x20 [ 1852.024659] ? oom_killer_disable+0x3a0/0x3a0 [ 1852.029188] mem_cgroup_out_of_memory+0x15e/0x210 [ 1852.034043] ? memory_oom_group_write+0x160/0x160 [ 1852.038883] ? mem_cgroup_try_charge+0x627/0xe20 [ 1852.043626] ? page_counter_try_charge+0x1c1/0x220 [ 1852.048542] try_charge+0xda9/0x1700 [ 1852.052257] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1852.057169] ? kasan_check_read+0x11/0x20 [ 1852.061306] ? mem_cgroup_from_task+0x1f0/0x1f0 [ 1852.065959] ? get_mem_cgroup_from_mm.part.62+0x221/0x880 [ 1852.071480] ? lock_page_memcg+0x350/0x350 [ 1852.075703] ? lock_acquire+0x1ed/0x520 [ 1852.079692] ? mem_cgroup_oom_control_write+0x100/0x100 [ 1852.085037] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1852.090562] ? check_preemption_disabled+0x48/0x280 [ 1852.095672] ? kasan_check_read+0x11/0x20 [ 1852.099817] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1852.105084] ? rcu_softirq_qs+0x20/0x20 [ 1852.109046] mem_cgroup_try_charge+0x627/0xe20 [ 1852.113610] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1852.119135] ? mem_cgroup_protected+0xa60/0xa60 [ 1852.123789] ? shmem_getattr+0x2c0/0x2c0 [ 1852.127838] ? mark_held_locks+0xc7/0x130 [ 1852.131965] ? print_usage_bug+0xc0/0xc0 [ 1852.136005] ? _raw_spin_unlock_irq+0x27/0x80 [ 1852.140585] ? _raw_spin_unlock_irq+0x27/0x80 [ 1852.145065] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1852.149636] ? print_usage_bug+0xc0/0xc0 [ 1852.153679] ? trace_hardirqs_off_caller+0x310/0x310 [ 1852.158778] mem_cgroup_try_charge_delay+0x1d/0xa0 [ 1852.163693] shmem_getpage_gfp+0x186b/0x4840 [ 1852.168096] ? shmem_add_to_page_cache+0x1950/0x1950 [ 1852.173209] ? mark_held_locks+0x130/0x130 [ 1852.177440] ? __update_load_avg_blocked_se+0x690/0x690 [ 1852.182789] ? print_usage_bug+0xc0/0xc0 [ 1852.186845] ? __lock_acquire+0x62f/0x4c20 [ 1852.191065] ? update_load_avg+0x387/0x2470 [ 1852.195375] ? mark_held_locks+0x130/0x130 [ 1852.199596] ? update_load_avg+0x387/0x2470 [ 1852.203915] ? zap_class+0x640/0x640 [ 1852.207613] ? mark_held_locks+0x130/0x130 [ 1852.211852] ? print_usage_bug+0xc0/0xc0 [ 1852.215894] ? zap_class+0x640/0x640 [ 1852.219613] ? lock_acquire+0x1ed/0x520 [ 1852.223596] ? alloc_set_pte+0x1447/0x1f40 [ 1852.227835] ? kasan_check_read+0x11/0x20 [ 1852.231963] ? do_raw_spin_lock+0x14f/0x350 [ 1852.236289] ? rwlock_bug.part.2+0x90/0x90 [ 1852.240506] ? __lock_is_held+0xb5/0x140 [ 1852.244552] ? _raw_spin_lock+0x35/0x40 [ 1852.248509] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1852.254030] ? alloc_set_pte+0xdee/0x1f40 [ 1852.258161] ? zap_class+0x640/0x640 [ 1852.261868] ? reacquire_held_locks+0x137/0x510 [ 1852.266519] ? alloc_set_pte+0x1447/0x1f40 [ 1852.270861] ? find_held_lock+0x13f/0x1c0 [ 1852.274993] ? filemap_map_pages+0xd6b/0x1a20 [ 1852.279467] ? lock_downgrade+0x900/0x900 [ 1852.283597] ? check_preemption_disabled+0x48/0x280 [ 1852.288611] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1852.293526] ? kasan_check_read+0x11/0x20 [ 1852.297654] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1852.302914] ? rcu_softirq_qs+0x20/0x20 [ 1852.307057] ? filemap_map_pages+0xd92/0x1a20 [ 1852.311542] ? find_get_entries_tag+0x1400/0x1400 [ 1852.316373] ? lock_downgrade+0x900/0x900 [ 1852.320510] ? do_raw_spin_unlock+0xa7/0x330 [ 1852.324950] ? do_raw_spin_trylock+0x270/0x270 [ 1852.329519] ? __pte_alloc_kernel+0x220/0x220 [ 1852.334001] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1852.339527] shmem_fault+0x25f/0x960 [ 1852.343221] ? zap_class+0x640/0x640 [ 1852.346924] ? shmem_read_mapping_page_gfp+0x1f0/0x1f0 [ 1852.352185] ? find_held_lock+0x36/0x1c0 [ 1852.356233] __do_fault+0x100/0x6b0 [ 1852.359845] ? lock_downgrade+0x900/0x900 [ 1852.363976] ? pmd_devmap_trans_unstable+0x220/0x220 [ 1852.369067] ? kasan_check_read+0x11/0x20 [ 1852.373203] ? do_raw_spin_unlock+0xa7/0x330 [ 1852.377599] ? do_raw_spin_trylock+0x270/0x270 [ 1852.382265] __handle_mm_fault+0x3ea6/0x5be0 [ 1852.386671] ? rcu_preempt_deferred_qs_irqrestore+0x8a5/0x1000 [ 1852.392644] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1852.397475] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1852.402562] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1852.408084] ? pmd_huge+0xf4/0x140 [ 1852.411622] ? zap_class+0x640/0x640 [ 1852.415315] ? zap_class+0x640/0x640 [ 1852.419013] ? find_held_lock+0x36/0x1c0 [ 1852.423062] ? handle_mm_fault+0x42a/0xc70 [ 1852.427282] ? lock_downgrade+0x900/0x900 [ 1852.431415] ? check_preemption_disabled+0x48/0x280 [ 1852.436419] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1852.441331] ? kasan_check_read+0x11/0x20 [ 1852.445459] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1852.450719] ? rcu_softirq_qs+0x20/0x20 [ 1852.454676] ? trace_hardirqs_off_caller+0x310/0x310 [ 1852.459882] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1852.465518] ? check_preemption_disabled+0x48/0x280 [ 1852.470522] handle_mm_fault+0x54f/0xc70 [ 1852.474569] ? __handle_mm_fault+0x5be0/0x5be0 [ 1852.479131] ? __get_user_pages+0xbc4/0x1ea0 [ 1852.483527] __get_user_pages+0xa3d/0x1ea0 [ 1852.487750] ? follow_page_mask+0x2160/0x2160 [ 1852.492223] ? vma_link+0x116/0x180 [ 1852.495833] ? ___perf_sw_event+0x51f/0x7c0 [ 1852.500141] ? zap_class+0x640/0x640 [ 1852.503843] ? rcu_softirq_qs+0x20/0x20 [ 1852.507820] ? lock_acquire+0x1ed/0x520 [ 1852.511778] ? __mm_populate+0x31a/0x4d0 [ 1852.515823] ? lock_release+0xa00/0xa00 [ 1852.519795] ? perf_trace_sched_process_exec+0x860/0x860 [ 1852.525234] populate_vma_page_range+0x2db/0x3d0 [ 1852.529976] ? follow_page+0x420/0x420 [ 1852.533847] ? find_vma+0x34/0x190 [ 1852.537377] __mm_populate+0x286/0x4d0 [ 1852.541246] ? populate_vma_page_range+0x3d0/0x3d0 [ 1852.546166] ? down_read_killable+0x150/0x150 [ 1852.550642] ? security_mmap_file+0x174/0x1b0 [ 1852.555124] vm_mmap_pgoff+0x27f/0x2c0 [ 1852.558998] ? vma_is_stack_for_current+0xd0/0xd0 [ 1852.563827] ? kasan_check_read+0x11/0x20 [ 1852.568058] ? _copy_to_user+0xc8/0x110 [ 1852.572020] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1852.577541] ksys_mmap_pgoff+0xf1/0x660 [ 1852.581497] ? do_syscall_64+0x9a/0x820 [ 1852.585492] ? find_mergeable_anon_vma+0xd0/0xd0 [ 1852.590233] ? trace_hardirqs_on+0xbd/0x310 [ 1852.594538] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1852.600059] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1852.605409] ? trace_hardirqs_off_caller+0x310/0x310 [ 1852.610497] __x64_sys_mmap+0xe9/0x1b0 [ 1852.614369] do_syscall_64+0x1b9/0x820 [ 1852.618236] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1852.623582] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1852.628494] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1852.633319] ? trace_hardirqs_on_caller+0x310/0x310 [ 1852.638320] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1852.643421] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1852.648429] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1852.653256] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1852.658430] RIP: 0033:0x457679 [ 1852.661620] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1852.680511] RSP: 002b:00007f2488b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 1852.688217] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000457679 [ 1852.695497] RDX: 0000000000000003 RSI: 0000000000b36000 RDI: 0000000020000000 [ 1852.702748] RBP: 000000000072bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 1852.710092] R10: 0000000000008031 R11: 0000000000000246 R12: 00007f2488b2d6d4 [ 1852.717358] R13: 00000000004c2d5e R14: 00000000004d5098 R15: 00000000ffffffff [ 1852.732171] Task in /syz4 killed as a result of limit of /syz4 [ 1852.745528] memory: usage 307184kB, limit 307200kB, failcnt 764 [ 1852.752046] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1852.758832] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1852.765096] Memory cgroup stats for /syz4: cache:7140KB rss:269164KB rss_huge:258048KB shmem:7160KB mapped_file:7128KB dirty:0KB writeback:0KB swap:0KB inactive_anon:7308KB active_anon:269208KB inactive_file:4KB active_file:0KB unevictable:4KB [ 1852.786892] Memory cgroup out of memory: Kill process 17403 (syz-executor4) score 1103 or sacrifice child [ 1852.796732] Killed process 17403 (syz-executor4) total-vm:70340kB, anon-rss:2192kB, file-rss:32768kB, shmem-rss:0kB [ 1852.807863] oom_reaper: reaped process 17403 (syz-executor4), now anon-rss:0kB, file-rss:32768kB, shmem-rss:0kB [ 1852.837224] syz-executor4 invoked oom-killer: gfp_mask=0x6200ca(GFP_HIGHUSER_MOVABLE), nodemask=(null), order=0, oom_score_adj=0 [ 1852.849126] syz-executor4 cpuset=syz4 mems_allowed=0 [ 1852.854357] CPU: 1 PID: 3511 Comm: syz-executor4 Not tainted 4.20.0-rc6+ #151 [ 1852.861712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1852.871043] Call Trace: [ 1852.873626] dump_stack+0x244/0x39d [ 1852.877237] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1852.882416] ? mark_held_locks+0x130/0x130 [ 1852.886636] ? mark_held_locks+0x130/0x130 [ 1852.890856] dump_header+0x27b/0xf72 [ 1852.894561] ? pagefault_out_of_memory+0x197/0x197 [ 1852.899491] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1852.905029] ? check_preemption_disabled+0x48/0x280 [ 1852.910045] ? zap_class+0x640/0x640 [ 1852.913758] ? __lock_is_held+0xb5/0x140 [ 1852.917819] ? zap_class+0x640/0x640 [ 1852.921516] ? print_usage_bug+0xc0/0xc0 [ 1852.925562] ? find_held_lock+0x36/0x1c0 [ 1852.929612] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1852.935137] ? find_held_lock+0x36/0x1c0 [ 1852.939196] ? mark_held_locks+0xc7/0x130 [ 1852.943352] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1852.948447] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1852.953595] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1852.958164] ? trace_hardirqs_on+0xbd/0x310 [ 1852.962475] ? kasan_check_read+0x11/0x20 [ 1852.966606] ? ___ratelimit+0x3b4/0x672 [ 1852.970571] ? trace_hardirqs_off_caller+0x310/0x310 [ 1852.975665] ? trace_hardirqs_on+0x310/0x310 [ 1852.980079] ? lock_downgrade+0x900/0x900 [ 1852.984222] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1852.989307] ? ___ratelimit+0x3b9/0x672 [ 1852.993289] ? idr_get_free+0xf70/0xf70 [ 1852.997270] ? _raw_spin_unlock_irq+0x27/0x80 [ 1853.001746] ? _raw_spin_unlock_irq+0x27/0x80 [ 1853.006248] oom_kill_process.cold.27+0x10/0x903 [ 1853.011006] ? _raw_spin_unlock_irq+0x27/0x80 [ 1853.015489] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1853.020069] ? oom_evaluate_task+0x540/0x540 [ 1853.024477] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1853.030001] ? cgroup_procs_next+0x70/0x70 [ 1853.034219] ? _raw_spin_unlock_irq+0x60/0x80 [ 1853.038696] ? oom_badness+0xaa0/0xaa0 [ 1853.042575] ? mem_cgroup_scan_tasks+0x1c3/0x1e0 [ 1853.047324] ? mem_cgroup_iter_break+0x30/0x30 [ 1853.051899] ? mark_held_locks+0xc7/0x130 [ 1853.056031] out_of_memory+0xa84/0x1430 [ 1853.059997] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1853.064572] ? kasan_check_read+0x11/0x20 [ 1853.068700] ? oom_killer_disable+0x3a0/0x3a0 [ 1853.073207] mem_cgroup_out_of_memory+0x15e/0x210 [ 1853.078032] ? memory_oom_group_write+0x160/0x160 [ 1853.082898] ? mem_cgroup_try_charge+0x627/0xe20 [ 1853.087654] ? page_counter_try_charge+0x1c1/0x220 [ 1853.092578] try_charge+0xda9/0x1700 [ 1853.096278] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1853.101189] ? kasan_check_read+0x11/0x20 [ 1853.105321] ? mem_cgroup_from_task+0x1f0/0x1f0 [ 1853.109978] ? get_mem_cgroup_from_mm.part.62+0x221/0x880 [ 1853.115500] ? lock_page_memcg+0x350/0x350 [ 1853.119739] ? lock_acquire+0x1ed/0x520 [ 1853.123710] ? mem_cgroup_oom_control_write+0x100/0x100 [ 1853.129068] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1853.134604] ? check_preemption_disabled+0x48/0x280 [ 1853.139626] ? kasan_check_read+0x11/0x20 [ 1853.143774] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1853.149043] ? rcu_softirq_qs+0x20/0x20 [ 1853.153014] mem_cgroup_try_charge+0x627/0xe20 [ 1853.157605] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1853.163129] ? mem_cgroup_protected+0xa60/0xa60 [ 1853.167820] ? shmem_getattr+0x2c0/0x2c0 [ 1853.171887] ? mark_held_locks+0xc7/0x130 [ 1853.176021] ? print_usage_bug+0xc0/0xc0 [ 1853.180076] ? _raw_spin_unlock_irq+0x27/0x80 [ 1853.184560] ? _raw_spin_unlock_irq+0x27/0x80 [ 1853.189049] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1853.193628] ? print_usage_bug+0xc0/0xc0 [ 1853.197686] ? trace_hardirqs_off_caller+0x310/0x310 [ 1853.202777] mem_cgroup_try_charge_delay+0x1d/0xa0 [ 1853.207695] shmem_getpage_gfp+0x186b/0x4840 [ 1853.212100] ? shmem_add_to_page_cache+0x1950/0x1950 [ 1853.217205] ? mark_held_locks+0x130/0x130 [ 1853.221443] ? zap_class+0x640/0x640 [ 1853.225143] ? find_held_lock+0x36/0x1c0 [ 1853.229208] ? print_usage_bug+0xc0/0xc0 [ 1853.233257] ? __lock_acquire+0x62f/0x4c20 [ 1853.237479] ? find_held_lock+0x36/0x1c0 [ 1853.241541] ? mark_held_locks+0x130/0x130 [ 1853.245791] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1853.250551] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1853.255128] ? retint_kernel+0x2d/0x2d [ 1853.259019] ? mark_held_locks+0x130/0x130 [ 1853.263254] ? print_usage_bug+0xc0/0xc0 [ 1853.267299] ? zap_class+0x640/0x640 [ 1853.270998] ? lock_acquire+0x1ed/0x520 [ 1853.274967] ? alloc_set_pte+0x1447/0x1f40 [ 1853.279216] ? kasan_check_read+0x11/0x20 [ 1853.283367] ? do_raw_spin_lock+0x14f/0x350 [ 1853.287676] ? rwlock_bug.part.2+0x90/0x90 [ 1853.291893] ? __lock_is_held+0xb5/0x140 [ 1853.295947] ? _raw_spin_lock+0x35/0x40 [ 1853.299927] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1853.305463] ? alloc_set_pte+0xdee/0x1f40 [ 1853.309595] ? zap_class+0x640/0x640 [ 1853.313304] ? reacquire_held_locks+0x137/0x510 [ 1853.317976] ? alloc_set_pte+0x1447/0x1f40 [ 1853.322203] ? find_held_lock+0x13f/0x1c0 [ 1853.326351] ? filemap_map_pages+0xd6b/0x1a20 [ 1853.330832] ? lock_downgrade+0x900/0x900 [ 1853.334964] ? check_preemption_disabled+0x48/0x280 [ 1853.339968] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1853.344881] ? kasan_check_read+0x11/0x20 [ 1853.349014] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1853.354283] ? rcu_softirq_qs+0x20/0x20 [ 1853.358249] ? filemap_map_pages+0xd92/0x1a20 [ 1853.362738] ? find_get_entries_tag+0x1400/0x1400 [ 1853.367565] ? lock_downgrade+0x900/0x900 [ 1853.371714] ? do_raw_spin_unlock+0xa7/0x330 [ 1853.376104] ? do_raw_spin_trylock+0x270/0x270 [ 1853.380669] ? __pte_alloc_kernel+0x220/0x220 [ 1853.385149] ? kmem_cache_alloc+0x12e/0x730 [ 1853.389455] ? ptlock_alloc+0x20/0x80 [ 1853.393241] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1853.398786] shmem_fault+0x25f/0x960 [ 1853.402526] ? zap_class+0x640/0x640 [ 1853.406230] ? shmem_read_mapping_page_gfp+0x1f0/0x1f0 [ 1853.411510] ? find_held_lock+0x36/0x1c0 [ 1853.415561] __do_fault+0x100/0x6b0 [ 1853.419171] ? lock_downgrade+0x900/0x900 [ 1853.423320] ? pmd_devmap_trans_unstable+0x220/0x220 [ 1853.428442] ? kasan_check_read+0x11/0x20 [ 1853.432572] ? do_raw_spin_unlock+0xa7/0x330 [ 1853.436987] ? do_raw_spin_trylock+0x270/0x270 [ 1853.441565] __handle_mm_fault+0x3ea6/0x5be0 [ 1853.445959] ? rcu_preempt_deferred_qs_irqrestore+0x8a5/0x1000 [ 1853.451934] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1853.456849] ? print_usage_bug+0xc0/0xc0 [ 1853.460893] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1853.466412] ? pmd_huge+0xf4/0x140 [ 1853.469940] ? zap_class+0x640/0x640 [ 1853.473634] ? zap_class+0x640/0x640 [ 1853.477330] ? find_held_lock+0x36/0x1c0 [ 1853.481380] ? handle_mm_fault+0x42a/0xc70 [ 1853.485601] ? lock_downgrade+0x900/0x900 [ 1853.489734] ? check_preemption_disabled+0x48/0x280 [ 1853.494750] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1853.499662] ? kasan_check_read+0x11/0x20 [ 1853.503790] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1853.509048] ? rcu_softirq_qs+0x20/0x20 [ 1853.513011] ? trace_hardirqs_off_caller+0x310/0x310 [ 1853.518099] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1853.523620] ? check_preemption_disabled+0x48/0x280 [ 1853.528725] handle_mm_fault+0x54f/0xc70 [ 1853.532770] ? __handle_mm_fault+0x5be0/0x5be0 [ 1853.537332] ? handle_mm_fault+0x56e/0xc70 [ 1853.541555] ? handle_mm_fault+0x59e/0xc70 [ 1853.545774] __get_user_pages+0xa3d/0x1ea0 [ 1853.550000] ? follow_page_mask+0x2160/0x2160 [ 1853.554484] ? vma_link+0x116/0x180 [ 1853.558122] ? ___perf_sw_event+0x51f/0x7c0 [ 1853.562514] ? zap_class+0x640/0x640 [ 1853.566217] ? rcu_softirq_qs+0x20/0x20 [ 1853.570194] ? lock_acquire+0x1ed/0x520 [ 1853.574164] ? __mm_populate+0x31a/0x4d0 [ 1853.578230] ? lock_release+0xa00/0xa00 [ 1853.582185] ? perf_trace_sched_process_exec+0x860/0x860 [ 1853.587626] populate_vma_page_range+0x2db/0x3d0 [ 1853.592366] ? follow_page+0x420/0x420 [ 1853.596238] ? find_vma+0x34/0x190 [ 1853.599762] __mm_populate+0x286/0x4d0 [ 1853.603634] ? populate_vma_page_range+0x3d0/0x3d0 [ 1853.608548] ? down_read_killable+0x150/0x150 [ 1853.613034] ? security_mmap_file+0x174/0x1b0 [ 1853.617524] vm_mmap_pgoff+0x27f/0x2c0 [ 1853.621490] ? vma_is_stack_for_current+0xd0/0xd0 [ 1853.626322] ? kasan_check_read+0x11/0x20 [ 1853.630452] ? _copy_to_user+0xc8/0x110 [ 1853.634412] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1853.639937] ksys_mmap_pgoff+0xf1/0x660 [ 1853.643891] ? do_syscall_64+0x9a/0x820 [ 1853.647855] ? find_mergeable_anon_vma+0xd0/0xd0 [ 1853.652708] ? trace_hardirqs_on+0xbd/0x310 [ 1853.657034] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1853.662556] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1853.667901] ? trace_hardirqs_off_caller+0x310/0x310 [ 1853.672988] __x64_sys_mmap+0xe9/0x1b0 [ 1853.676868] do_syscall_64+0x1b9/0x820 [ 1853.680737] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1853.686085] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1853.691005] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1853.695833] ? trace_hardirqs_on_caller+0x310/0x310 [ 1853.700830] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1853.705828] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1853.710830] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1853.715660] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1853.720833] RIP: 0033:0x457679 [ 1853.724014] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1853.742899] RSP: 002b:00007f2488b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 1853.750684] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000457679 [ 1853.757948] RDX: 0000000000000003 RSI: 0000000000b36000 RDI: 0000000020000000 [ 1853.765201] RBP: 000000000072bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 1853.772454] R10: 0000000000008031 R11: 0000000000000246 R12: 00007f2488b2d6d4 [ 1853.779706] R13: 00000000004c2d5e R14: 00000000004d5098 R15: 00000000ffffffff [ 1853.787231] Task in /syz4 killed as a result of limit of /syz4 [ 1853.793307] memory: usage 307168kB, limit 307200kB, failcnt 776 [ 1853.801720] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1853.808578] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1853.814776] Memory cgroup stats for /syz4: cache:9516KB rss:267016KB rss_huge:256000KB shmem:9404KB mapped_file:9504KB dirty:0KB writeback:0KB swap:0KB inactive_anon:9620KB active_anon:267060KB inactive_file:0KB active_file:0KB unevictable:4KB 03:55:14 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x60, 0x0) 03:55:14 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:14 executing program 4: r0 = semget$private(0x0, 0x7, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semop(r0, &(0x7f0000000200)=[{0x0, 0x8, 0x1000}, {}], 0x2) 03:55:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000002c0)={{}, {}, 0x8, {0x2, 0x0, @local}, 'veth0_to_team\x00'}) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000006000)={{}, {0x0, @link_local}, 0x1a, {0x2, 0x0, @remote}, 'syzkaller0\x00'}) 03:55:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/raw\x00') epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:55:14 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000001c0)={0x1, &(0x7f0000000240)=[{0x6}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"76657400000074000000000400", 0x43732e5398416f1a}) [ 1853.836645] Memory cgroup out of memory: Kill process 17443 (syz-executor4) score 1103 or sacrifice child [ 1853.846434] Killed process 17443 (syz-executor4) total-vm:70340kB, anon-rss:2192kB, file-rss:32768kB, shmem-rss:0kB [ 1853.857639] oom_reaper: reaped process 17443 (syz-executor4), now anon-rss:0kB, file-rss:32768kB, shmem-rss:0kB 03:55:14 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:14 executing program 2: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) linkat(r0, &(0x7f0000000280)='./file0\x00', r0, &(0x7f00000002c0)='./file1\x00', 0x0) 03:55:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff}) splice(r2, 0x0, r0, 0x0, 0x400000a77, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(r2, 0x407, 0x0) close(r1) 03:55:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) 03:55:14 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xd00000000000000, 0x0) 03:55:14 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:14 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_open_dev$sg(0x0, 0x80000001, 0x2081) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) 03:55:15 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x201, 0x800000010007a) ioctl$KVM_CREATE_VCPU(r0, 0x80045515, 0xfffffffffffffffe) 03:55:15 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f0000000140)="abbaf7babebbca0097e360c2646b180174b08a0a383b1d748011ab98b669", 0x1e, 0x8000, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f0000000100)="cba01d0000000000000000a298432cb933c040774ff4f854df5c01ad83cbd2873760a17d60e613", 0x27, 0x0, 0x0, 0x0) 03:55:15 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:15 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2200000000000000, 0x0) 03:55:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) 03:55:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) migrate_pages(0x0, 0x31, 0x0, &(0x7f0000000180)=0x1) 03:55:15 executing program 1: [ 1854.924828] audit: type=1326 audit(2000001315.567:1445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3637 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 03:55:15 executing program 4: 03:55:15 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080), 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:15 executing program 1: 03:55:15 executing program 4: 03:55:15 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2c000000, 0x0) 03:55:15 executing program 4: [ 1855.151116] hfsplus: unable to find HFS+ superblock [ 1855.192796] hfsplus: unable to find HFS+ superblock 03:55:16 executing program 2: 03:55:16 executing program 1: 03:55:16 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080), 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) [ 1855.717228] audit: type=1326 audit(2000001316.357:1446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=3637 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 03:55:16 executing program 0: 03:55:16 executing program 4: 03:55:16 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x820e, 0x0) 03:55:16 executing program 4: 03:55:16 executing program 1: 03:55:16 executing program 0: 03:55:16 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080), 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:16 executing program 2: 03:55:16 executing program 0: 03:55:16 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff6, 0x0) 03:55:16 executing program 4: 03:55:16 executing program 1: 03:55:16 executing program 0: 03:55:16 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:16 executing program 2: 03:55:16 executing program 0: 03:55:16 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x34000000, 0x0) 03:55:16 executing program 4: 03:55:16 executing program 1: 03:55:16 executing program 2: 03:55:16 executing program 0: [ 1856.234780] hfsplus: unable to find HFS+ superblock 03:55:16 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:16 executing program 4: 03:55:16 executing program 1: [ 1856.295318] hfsplus: unable to find HFS+ superblock 03:55:17 executing program 2: 03:55:17 executing program 0: 03:55:17 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xfdfdffff, 0x0) 03:55:17 executing program 2: 03:55:17 executing program 4: 03:55:17 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:17 executing program 1: 03:55:17 executing program 0: 03:55:17 executing program 2: 03:55:17 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:17 executing program 1: 03:55:17 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x6c00, 0x0) 03:55:17 executing program 0: 03:55:17 executing program 4: 03:55:17 executing program 2: 03:55:17 executing program 1: 03:55:17 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:17 executing program 0: 03:55:17 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x4244000000000000, 0x0) 03:55:17 executing program 2: 03:55:17 executing program 4: 03:55:17 executing program 1: 03:55:17 executing program 0: 03:55:17 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:17 executing program 4: 03:55:17 executing program 1: 03:55:17 executing program 0: 03:55:17 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xf5ffffff00000000, 0x0) 03:55:17 executing program 2: 03:55:17 executing program 1: 03:55:17 executing program 0: 03:55:17 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x0, 0x0}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:17 executing program 4: perf_event_open(&(0x7f0000aaa000)={0x2000000000000002, 0x70, 0x28, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa13b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428bd1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = gettid() r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r2, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r0, r0, 0xf}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 03:55:17 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f0, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f3, &(0x7f0000000080)='ip6tnl0\x00') 03:55:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000740)={0x0, 0xffffffffffffffff, 0x0, 0xfffffe89, &(0x7f0000000580)='\x00', 0x0}, 0x30) r5 = perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)=r4, 0x4) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x0, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7fffffff, 0x7, 0x7fffffff, 0x20, 0x0, 0x0, 0x0, 0x0, 0x101, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x5, 0x0, 0x81, 0x0, 0x20, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x0, 0x100000000, 0x7}, 0xffffffffffffffff, 0x2, r5, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000040)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={"6e72300100", 0x80e}) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0xa) openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000000)='\'[GPL/\x00') ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000980)) write$cgroup_type(r2, &(0x7f0000001900)="746888646164656400", 0xfdef) 03:55:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3e8) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1a7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r2 = socket$kcm(0x2, 0x3, 0x2) recvmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000340)=""/40, 0x28}, {0x0}, {0x0}], 0x3, &(0x7f0000000d40)=""/75, 0x4b, 0x9}, 0x40000162) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000c00)={0xffffffffffffffff, &(0x7f0000000a80), 0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, &(0x7f0000000380)="6e72306c0e60a19ef9d2c658d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f00000004c0)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$TUNSETLINK(r3, 0x400454cd, 0x337) recvmsg(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, 0x0, 0x0, &(0x7f0000000980)=""/188, 0xbc}, 0x40002000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) 03:55:17 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x9000000, 0x0) [ 1857.247216] ip6_tunnel: 6tnl0 xmit: Local address not yet configured! 03:55:17 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x0, 0x0}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:18 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), 0x0}, 0x20) [ 1857.365301] hfsplus: unable to find HFS+ superblock 03:55:18 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) [ 1857.453937] hfsplus: unable to find HFS+ superblock 03:55:18 executing program 1: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x80000) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f00000001c0)="dd6e802bd0af9b185eaa90139bfb7b6e733acca10be8c91348bebab740f152c5dcba2a89d4f5d1c7a9cd48eed90059b28b4d8b86c0b3ea6f8c6d382879a074ba8659e3b45a6a556b9dd40ebd58fe6408da4a8c6980918da834f39a9f0ebdcebbbf2100c7b3baa37fcf3322db5466b18962dd4db14016e74040edbfe4077b752c55966ebde2db44992449cd3129d847f66365b2392a9f014dd204091e971ff02fa4572c4d1d1a49873cc5e6dec24fff2e95a2e2c54b7cc4f8984bba88f6bd72d297007d96b3228195b8ee87115b9f0fec9853974cf8c9d2c892561fed7b5587") r1 = socket$inet_tcp(0x2, 0x1, 0x0) socket$kcm(0x29, 0x5, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) connect$inet(r1, &(0x7f0000000180), 0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'team_slave_0\x00', 0x4}, 0x18) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000040)=[@window={0x3, 0x0, 0xe00}, @window, @mss], 0x3) 03:55:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) ioctl(0xffffffffffffffff, 0x9e4, &(0x7f0000000980)="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") r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x4557434d) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)="7663616e300097f900", 0x10) sendfile(r0, r2, &(0x7f0000000100), 0x20000000009) socket$packet(0x11, 0x0, 0x300) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000180)) sendmsg$FOU_CMD_GET(r0, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, 0x0}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) 03:55:18 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x0, 0x0}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) [ 1857.618629] IPVS: sync thread started: state = BACKUP, mcast_ifn = team_slave_0, syncid = 4, id = 0 03:55:18 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x4000, 0x0) 03:55:18 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000040)}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 03:55:18 executing program 1: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x80000) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f00000001c0)="dd6e802bd0af9b185eaa90139bfb7b6e733acca10be8c91348bebab740f152c5dcba2a89d4f5d1c7a9cd48eed90059b28b4d8b86c0b3ea6f8c6d382879a074ba8659e3b45a6a556b9dd40ebd58fe6408da4a8c6980918da834f39a9f0ebdcebbbf2100c7b3baa37fcf3322db5466b18962dd4db14016e74040edbfe4077b752c55966ebde2db44992449cd3129d847f66365b2392a9f014dd204091e971ff02fa4572c4d1d1a49873cc5e6dec24fff2e95a2e2c54b7cc4f8984bba88f6bd72d297007d96b3228195b8ee87115b9f0fec9853974cf8c9d2c892561fed7b5587") r1 = socket$inet_tcp(0x2, 0x1, 0x0) socket$kcm(0x29, 0x5, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) connect$inet(r1, &(0x7f0000000180), 0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'team_slave_0\x00', 0x4}, 0x18) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000040)=[@window={0x3, 0x0, 0xe00}, @window, @mss], 0x3) [ 1857.802388] hfsplus: unable to find HFS+ superblock [ 1857.906939] hfsplus: unable to find HFS+ superblock 03:55:18 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000040)}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080), 0x10) shutdown(r0, 0x0) 03:55:18 executing program 1: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x80000) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f00000001c0)="dd6e802bd0af9b185eaa90139bfb7b6e733acca10be8c91348bebab740f152c5dcba2a89d4f5d1c7a9cd48eed90059b28b4d8b86c0b3ea6f8c6d382879a074ba8659e3b45a6a556b9dd40ebd58fe6408da4a8c6980918da834f39a9f0ebdcebbbf2100c7b3baa37fcf3322db5466b18962dd4db14016e74040edbfe4077b752c55966ebde2db44992449cd3129d847f66365b2392a9f014dd204091e971ff02fa4572c4d1d1a49873cc5e6dec24fff2e95a2e2c54b7cc4f8984bba88f6bd72d297007d96b3228195b8ee87115b9f0fec9853974cf8c9d2c892561fed7b5587") r1 = socket$inet_tcp(0x2, 0x1, 0x0) socket$kcm(0x29, 0x5, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) connect$inet(r1, &(0x7f0000000180), 0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'team_slave_0\x00', 0x4}, 0x18) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000040)=[@window={0x3, 0x0, 0xe00}, @window, @mss], 0x3) 03:55:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3e8) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1a7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r2 = socket$kcm(0x2, 0x3, 0x2) recvmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000340)=""/40, 0x28}, {0x0}, {0x0}], 0x3, &(0x7f0000000d40)=""/75, 0x4b, 0x9}, 0x40000162) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000c00)={0xffffffffffffffff, &(0x7f0000000a80), 0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, &(0x7f0000000380)="6e72306c0e60a19ef9d2c658d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f00000004c0)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$TUNSETLINK(r3, 0x400454cd, 0x337) recvmsg(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, 0x0, 0x0, &(0x7f0000000980)=""/188, 0xbc}, 0x40002000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) 03:55:18 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xa, 0x0) [ 1858.287300] hfsplus: unable to find HFS+ superblock 03:55:18 executing program 1: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x80000) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f00000001c0)="dd6e802bd0af9b185eaa90139bfb7b6e733acca10be8c91348bebab740f152c5dcba2a89d4f5d1c7a9cd48eed90059b28b4d8b86c0b3ea6f8c6d382879a074ba8659e3b45a6a556b9dd40ebd58fe6408da4a8c6980918da834f39a9f0ebdcebbbf2100c7b3baa37fcf3322db5466b18962dd4db14016e74040edbfe4077b752c55966ebde2db44992449cd3129d847f66365b2392a9f014dd204091e971ff02fa4572c4d1d1a49873cc5e6dec24fff2e95a2e2c54b7cc4f8984bba88f6bd72d297007d96b3228195b8ee87115b9f0fec9853974cf8c9d2c892561fed7b5587") r1 = socket$inet_tcp(0x2, 0x1, 0x0) socket$kcm(0x29, 0x5, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) connect$inet(r1, &(0x7f0000000180), 0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'team_slave_0\x00', 0x4}, 0x18) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000040)=[@window={0x3, 0x0, 0xe00}, @window, @mss], 0x3) [ 1858.380818] hfsplus: unable to find HFS+ superblock 03:55:19 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty=0xdb19000000000000}}, 0x80fe, 0x0, 0x0, 0x0, 0x5}, 0x98) 03:55:19 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000040)}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5}, 0x3e8) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1a7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r2 = socket$kcm(0x2, 0x3, 0x2) recvmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000340)=""/40, 0x28}, {0x0}, {0x0}], 0x3, &(0x7f0000000d40)=""/75, 0x4b, 0x9}, 0x40000162) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000c00)={0xffffffffffffffff, &(0x7f0000000a80), 0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, &(0x7f0000000380)="6e72306c0e60a19ef9d2c658d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f00000004c0)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$TUNSETLINK(r3, 0x400454cd, 0x337) recvmsg(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, 0x0, 0x0, &(0x7f0000000980)=""/188, 0xbc}, 0x40002000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) 03:55:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(r0, &(0x7f0000004480)={&(0x7f0000000100)=@can, 0x80, 0x0}, 0x0) 03:55:19 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x4d50000000000000, 0x0) 03:55:19 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:19 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) accept(r0, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) 03:55:19 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x7a00000000000000, 0x0) 03:55:19 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000000)="bc", 0x1, 0x20048082, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000200)="d9c1c4e2849c8a5d69b037cf3939267dc778b09f327df527016f88c1c33b74de9013caadbf41549af7365fae9325bf57c5caf4645ec0e11107b41c6f3e6eac4f59b40856cc16b3d0670912765023d2abd13bbbdf0ae71dd2b607f4d44b2420f32fd48722a2f2ce321b27f500a397f97d163edb7832fcb714898afff927685c3d668971daa6e97c14c9a1aa77f0dafe271dad7f4ded44a33d592ecf345613e9ce1f09d097c198fef8d24cf7b1cd214f1794c97c3385b4ba7abb7aa1c02330f922aee54656ece7ebae229f0e347879600d", 0xd0, 0x40, 0x0, 0x0) 03:55:20 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:20 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) accept(r0, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) 03:55:20 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff00000000, 0x0) 03:55:20 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000004c0)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)}], 0x1500, 0x0) [ 1859.594085] syz-executor4 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 1859.649063] syz-executor4 cpuset=syz4 mems_allowed=0 [ 1859.655000] CPU: 0 PID: 3902 Comm: syz-executor4 Not tainted 4.20.0-rc6+ #151 [ 1859.662298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1859.671749] Call Trace: [ 1859.674344] dump_stack+0x244/0x39d [ 1859.678012] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1859.683221] ? mark_held_locks+0x130/0x130 [ 1859.687470] ? mark_held_locks+0x130/0x130 [ 1859.691731] dump_header+0x27b/0xf72 [ 1859.695471] ? pagefault_out_of_memory+0x197/0x197 [ 1859.700406] ? print_usage_bug+0xc0/0xc0 [ 1859.704455] ? check_preemption_disabled+0x48/0x280 [ 1859.709460] ? zap_class+0x640/0x640 [ 1859.713167] ? __lock_is_held+0xb5/0x140 [ 1859.717219] ? mark_held_locks+0xc7/0x130 [ 1859.721348] ? print_usage_bug+0xc0/0xc0 [ 1859.725396] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1859.730139] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1859.734704] ? retint_kernel+0x2d/0x2d [ 1859.738582] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1859.743611] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1859.748354] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1859.753803] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1859.758551] ? retint_kernel+0x2d/0x2d [ 1859.762428] ? _raw_spin_unlock_irqrestore+0xaf/0xd0 [ 1859.767527] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1859.772618] ? ___ratelimit+0x3b9/0x672 [ 1859.776579] ? idr_get_free+0xf70/0xf70 [ 1859.780542] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1859.785309] oom_kill_process.cold.27+0x10/0x903 [ 1859.790055] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1859.794819] ? oom_evaluate_task+0x540/0x540 [ 1859.799242] ? mem_cgroup_iter+0x184/0x1160 [ 1859.803564] ? mem_cgroup_scan_tasks+0x1c3/0x1e0 [ 1859.808303] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1859.813045] ? mem_cgroup_iter_break+0x30/0x30 [ 1859.817620] ? out_of_memory+0xbbb/0x1430 [ 1859.821757] out_of_memory+0xa84/0x1430 [ 1859.825822] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1859.830402] ? kasan_check_read+0x11/0x20 [ 1859.834542] ? oom_killer_disable+0x3a0/0x3a0 [ 1859.839042] mem_cgroup_out_of_memory+0x15e/0x210 [ 1859.843871] ? memory_oom_group_write+0x160/0x160 [ 1859.848697] ? mem_cgroup_try_charge+0x627/0xe20 [ 1859.853458] ? page_counter_try_charge+0x1c1/0x220 [ 1859.858392] try_charge+0xda9/0x1700 [ 1859.862103] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1859.867023] ? kasan_check_read+0x11/0x20 [ 1859.871177] ? mem_cgroup_from_task+0x1f0/0x1f0 [ 1859.875852] ? get_mem_cgroup_from_mm.part.62+0x221/0x880 [ 1859.881393] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1859.886137] ? lock_page_memcg+0x350/0x350 [ 1859.890358] ? lock_acquire+0x1ed/0x520 [ 1859.894338] ? mem_cgroup_oom_control_write+0x100/0x100 [ 1859.899688] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1859.905210] ? check_preemption_disabled+0x48/0x280 [ 1859.910222] ? kasan_check_read+0x11/0x20 [ 1859.914362] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1859.919621] ? rcu_softirq_qs+0x20/0x20 [ 1859.923600] mem_cgroup_try_charge+0x627/0xe20 [ 1859.928173] ? mark_held_locks+0xc7/0x130 [ 1859.932307] ? mem_cgroup_protected+0xa60/0xa60 [ 1859.936992] ? wp_page_copy+0x1881/0x2500 [ 1859.941133] ? lock_downgrade+0x900/0x900 [ 1859.945349] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1859.950090] ? kasan_check_read+0x11/0x20 [ 1859.954223] ? do_raw_spin_unlock+0xa7/0x330 [ 1859.958619] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1859.964148] mem_cgroup_try_charge_delay+0x1d/0xa0 [ 1859.969064] wp_page_copy+0x520/0x2500 [ 1859.973032] ? follow_pfn+0x2e0/0x2e0 [ 1859.977071] ? print_usage_bug+0xc0/0xc0 [ 1859.981117] ? lock_downgrade+0x900/0x900 [ 1859.985255] ? print_usage_bug+0xc0/0xc0 [ 1859.989300] ? trace_hardirqs_on+0x310/0x310 [ 1859.993691] ? zap_class+0x640/0x640 [ 1859.997395] ? mark_held_locks+0xc7/0x130 [ 1860.001529] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1860.006275] ? mark_held_locks+0xc7/0x130 [ 1860.010513] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1860.015255] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1860.019995] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1860.024567] ? retint_kernel+0x2d/0x2d [ 1860.028451] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1860.033376] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1860.038115] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1860.043565] ? find_held_lock+0x36/0x1c0 [ 1860.047618] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1860.052361] ? retint_kernel+0x2d/0x2d [ 1860.056239] ? preempt_count_sub+0x49/0x150 [ 1860.060548] do_wp_page+0x520/0x2920 [ 1860.064252] ? finish_mkwrite_fault+0x650/0x650 [ 1860.069013] ? perf_swevent_start_hrtimer.part.75+0x19a/0x260 [ 1860.074880] ? do_raw_spin_unlock+0xa7/0x330 [ 1860.079273] ? print_usage_bug+0xc0/0xc0 [ 1860.083373] ? kvm_clock_read+0x18/0x30 [ 1860.087335] ? kvm_sched_clock_read+0x9/0x20 [ 1860.091733] ? sched_clock+0x31/0x50 [ 1860.095443] ? sched_clock_cpu+0x1b/0x1b0 [ 1860.099581] ? __lock_acquire+0x62f/0x4c20 [ 1860.103799] ? cpu_clock_event_start+0x12c/0x180 [ 1860.108548] ? mark_held_locks+0x130/0x130 [ 1860.112764] ? print_usage_bug+0xc0/0xc0 [ 1860.116812] ? mark_held_locks+0x130/0x130 [ 1860.121064] ? __perf_event_period+0x5c0/0x5c0 [ 1860.125666] ? mark_held_locks+0xc7/0x130 [ 1860.129815] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1860.134581] ? print_usage_bug+0xc0/0xc0 [ 1860.138626] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1860.143591] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1860.148180] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1860.152923] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1860.158358] ? print_usage_bug+0xc0/0xc0 [ 1860.162420] ? print_usage_bug+0xc0/0xc0 [ 1860.166515] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1860.171254] ? zap_class+0x640/0x640 [ 1860.174961] ? mark_held_locks+0xc7/0x130 [ 1860.179113] ? __lock_acquire+0x62f/0x4c20 [ 1860.183346] ? lock_acquire+0x1ed/0x520 [ 1860.187320] ? __handle_mm_fault+0x1fac/0x5be0 [ 1860.191889] ? kasan_check_read+0x11/0x20 [ 1860.196023] ? do_raw_spin_lock+0x14f/0x350 [ 1860.200329] ? rwlock_bug.part.2+0x90/0x90 [ 1860.204555] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1860.209494] ? kasan_check_read+0x11/0x20 [ 1860.213624] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1860.218899] __handle_mm_fault+0x3bef/0x5be0 [ 1860.223317] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1860.228151] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1860.232907] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1860.237568] ? retint_kernel+0x2d/0x2d [ 1860.241538] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1860.246472] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1860.251040] ? retint_kernel+0x2d/0x2d [ 1860.254911] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1860.259847] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1860.264609] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1860.270170] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1860.274913] ? retint_kernel+0x2d/0x2d [ 1860.278900] ? handle_mm_fault+0x75d/0xc70 [ 1860.283118] handle_mm_fault+0x54f/0xc70 [ 1860.287191] ? __handle_mm_fault+0x5be0/0x5be0 [ 1860.291761] ? find_vma+0x34/0x190 [ 1860.295299] __do_page_fault+0x5e8/0xe60 [ 1860.299373] do_page_fault+0xf2/0x7e0 [ 1860.303247] ? vmalloc_sync_all+0x30/0x30 [ 1860.307375] ? error_entry+0x76/0xd0 [ 1860.311073] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1860.316074] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1860.320998] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1860.325827] ? trace_hardirqs_on_caller+0x310/0x310 [ 1860.330829] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1860.336273] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1860.341104] page_fault+0x1e/0x30 [ 1860.344545] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 1860.350413] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 1860.369353] RSP: 0018:ffff8881bd9175b0 EFLAGS: 00010206 [ 1860.374701] RAX: 0000000000000000 RBX: 00000000000101d0 RCX: 000000000000a1f0 [ 1860.381957] RDX: 00000000000101d0 RSI: ffff88805d3dd988 RDI: 0000000020c3c000 [ 1860.389235] RBP: ffff8881bd9175e8 R08: ffffed100ba7cf6f R09: ffffed100ba7cf6f [ 1860.396499] R10: ffffed100ba7cf6e R11: ffff88805d3e7b77 R12: 0000000020c461f0 [ 1860.403761] R13: 0000000020c36020 R14: ffff88805d3d79a8 R15: 00007ffffffff000 [ 1860.411033] ? copyout+0xe4/0x100 [ 1860.414577] _copy_to_iter+0x2a3/0x1440 [ 1860.418550] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 1860.423725] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1860.429249] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1860.434255] ? copy_page_from_iter+0x8f0/0x8f0 [ 1860.438826] ? __lock_is_held+0xb5/0x140 [ 1860.442910] skb_copy_datagram_iter+0x1fe/0xc10 [ 1860.447574] ? finish_wait+0x430/0x430 [ 1860.451456] ? __sk_queue_drop_skb+0x1f0/0x1f0 [ 1860.456081] ? tsk_advance_rx_queue+0x19/0x180 [ 1860.460650] tipc_recvstream+0x44e/0x9e0 [ 1860.464705] ? tipc_recvmsg+0xd60/0xd60 [ 1860.468774] ? tipc_recvmsg+0xd60/0xd60 [ 1860.472733] sock_recvmsg+0xd0/0x110 [ 1860.476430] ? __sock_recv_ts_and_drops+0x420/0x420 [ 1860.481439] ___sys_recvmsg+0x2b6/0x680 [ 1860.485432] ? retint_kernel+0x1b/0x2d [ 1860.489338] ? ___sys_sendmsg+0x930/0x930 [ 1860.493476] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1860.498228] ? __fget_light+0x2e9/0x430 [ 1860.502199] ? fget_raw+0x20/0x20 [ 1860.505651] ? __might_fault+0x12b/0x1e0 [ 1860.509707] ? lock_downgrade+0x900/0x900 [ 1860.513843] ? lock_release+0xa00/0xa00 [ 1860.517818] ? perf_trace_sched_process_exec+0x860/0x860 [ 1860.523253] ? posix_ktime_get_ts+0x15/0x20 [ 1860.527571] ? trace_hardirqs_off_caller+0x310/0x310 [ 1860.532664] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1860.538188] ? sockfd_lookup_light+0xc5/0x160 [ 1860.542673] __sys_recvmsg+0x11a/0x280 [ 1860.546548] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1860.551136] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1860.555910] ? do_syscall_64+0x9a/0x820 [ 1860.559871] ? do_syscall_64+0x9a/0x820 [ 1860.563843] ? trace_hardirqs_off_caller+0x310/0x310 [ 1860.568928] ? do_syscall_64+0x2b9/0x820 [ 1860.572978] __x64_sys_recvmsg+0x78/0xb0 [ 1860.577035] do_syscall_64+0x1b9/0x820 [ 1860.580916] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1860.586265] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1860.591179] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1860.596024] ? trace_hardirqs_on_caller+0x310/0x310 [ 1860.601043] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1860.606052] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1860.611590] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1860.616602] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1860.621457] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1860.626636] RIP: 0033:0x457679 [ 1860.629814] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1860.648696] RSP: 002b:00007f2488b2cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1860.656385] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457679 [ 1860.663739] RDX: 0000000000003f00 RSI: 0000000020000200 RDI: 0000000000000004 [ 1860.671012] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1860.678267] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2488b2d6d4 [ 1860.685529] R13: 00000000004c3ba8 R14: 00000000004d67c0 R15: 00000000ffffffff [ 1860.694750] Task in /syz4 killed as a result of limit of /syz4 [ 1860.700897] memory: usage 307104kB, limit 307200kB, failcnt 819 [ 1860.707119] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1860.713866] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1860.720060] Memory cgroup stats for /syz4: cache:128KB rss:277392KB rss_huge:266240KB shmem:52KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:92KB active_anon:277472KB inactive_file:0KB active_file:0KB unevictable:4KB [ 1860.741655] Memory cgroup out of memory: Kill process 3895 (syz-executor4) score 148 or sacrifice child 03:55:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x2) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x82200010}, 0xc, &(0x7f0000000a00)={0x0}}, 0x0) 03:55:21 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:21 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006180)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000240)=""/5, 0x5}], 0x1}}], 0x1, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 03:55:21 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) accept(r0, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) 03:55:21 executing program 2: r0 = socket(0x10, 0x80002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="5500000018007f5300fe01b2a4a280930a06000000a84308910000003900090008000c0001c08a3e2f00dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000060cec4fab651383686496fbca412371", 0x55}], 0x1}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a7c2d023c126285718070") 03:55:21 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x6c000000, 0x0) [ 1860.753306] Killed process 3902 (syz-executor4) total-vm:70604kB, anon-rss:12700kB, file-rss:33648kB, shmem-rss:0kB [ 1860.770382] oom_reaper: reaped process 3902 (syz-executor4), now anon-rss:0kB, file-rss:32816kB, shmem-rss:0kB 03:55:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b93c564b636700000000b4ce360000a299b7f4d0e305952f1bb4c59fcd68d9e4", 0x20) r1 = accept(r0, 0x0, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={0x0, 0x4}, 0x8) r2 = socket(0x9, 0x5, 0x6) ioctl$PPPIOCGL2TPSTATS(r2, 0x80487436, &(0x7f0000000000)="122ea24df81db58362bf7f070f81a476c608dd724750e4f21c43841d16ba6ffe83493a13f4a45da28718e026ddde87b53ed21a5befd5d3f978f377a72e87e79cd320") r3 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000006dc0)=[{0x1000000f0ffffff, 0xffffff7f00000000, &(0x7f0000000080)=[{&(0x7f0000000140), 0x8000a0}], 0x1}], 0x1, 0x0) [ 1860.827033] hfsplus: unable to find HFS+ superblock 03:55:21 executing program 4: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000001480)) [ 1860.903435] hfsplus: unable to find HFS+ superblock 03:55:21 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) accept(r0, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) 03:55:21 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xd, 0x0) 03:55:21 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:21 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu//yz0\x00', 0x1ff) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000000)=""/189, &(0x7f00000000c0)=0xbd) [ 1861.076181] hfsplus: unable to find HFS+ superblock 03:55:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) connect$inet(r0, &(0x7f0000000180), 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@window={0x3, 0x0, 0xe00}, @window, @mss], 0x3) 03:55:21 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) [ 1861.153132] hfsplus: unable to find HFS+ superblock 03:55:22 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006180)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000240)=""/5, 0x5}], 0x1}}], 0x1, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 03:55:22 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) accept(r0, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:55:22 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xc0ed0000, 0x0) 03:55:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) connect$inet(r0, &(0x7f0000000180), 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000600)=[@window, @sack_perm, @timestamp, @mss], 0x4) [ 1861.558284] hfsplus: unable to find HFS+ superblock [ 1861.626780] hfsplus: unable to find HFS+ superblock 03:55:22 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000000240)=0x1, 0x4) sendto$inet(r1, &(0x7f0000000100)='c', 0x1, 0x4000000, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000040)="c8", 0x1, 0x0, 0x0, 0x0) 03:55:22 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:22 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x100000000011, 0x4, 0x4, 0x7}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000040), 0x0}, 0x18) 03:55:22 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) accept(r0, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 03:55:22 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x4c00000000000000, 0x0) 03:55:22 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:55:22 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0a5c2d023c126285718070") r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e22}, 0x10) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x0, 0x64032, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000edffc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/81, 0x51}, 0x40002102) 03:55:22 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:22 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) accept(r0, 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 03:55:22 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000140)={{0x0, @dev, 0x0, 0x0, 'sed\x00'}, {@loopback}}, 0x44) 03:55:23 executing program 0: r0 = socket$inet6(0xa, 0xa, 0x1f) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) poll(&(0x7f00000000c0)=[{r2}, {r1, 0x2}], 0x2, 0xbf3) close(r2) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x20000004, 0x0, 0x0) 03:55:23 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_elf32(r0, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x70000) 03:55:23 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:23 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xfcfdffff00000000, 0x0) [ 1862.416426] IPVS: set_ctl: invalid protocol: 0 172.20.20.0:0 03:55:23 executing program 2: 03:55:23 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:23 executing program 2: 03:55:23 executing program 4: 03:55:23 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x6, 0x0) 03:55:23 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) [ 1862.662833] hfsplus: unable to find HFS+ superblock [ 1862.740902] hfsplus: unable to find HFS+ superblock 03:55:23 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) accept(r0, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 03:55:23 executing program 4: 03:55:23 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:23 executing program 2: 03:55:23 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x97ffffff00000000, 0x0) 03:55:23 executing program 0: 03:55:23 executing program 4: 03:55:23 executing program 2: 03:55:23 executing program 0: 03:55:23 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:24 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x3000000, 0x0) 03:55:24 executing program 0: [ 1863.417931] hfsplus: unable to find HFS+ superblock [ 1863.461701] hfsplus: unable to find HFS+ superblock 03:55:24 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) accept(r0, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 03:55:24 executing program 4: 03:55:24 executing program 2: 03:55:24 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:24 executing program 0: 03:55:24 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x68000000, 0x0) 03:55:24 executing program 4: [ 1864.072944] hfsplus: unable to find HFS+ superblock 03:55:24 executing program 2: 03:55:24 executing program 0: 03:55:24 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:24 executing program 4: 03:55:24 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) listen(r0, 0x5eb857) accept(r0, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) [ 1864.172006] hfsplus: unable to find HFS+ superblock 03:55:24 executing program 2: 03:55:24 executing program 0: 03:55:24 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:24 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff, 0x0) 03:55:25 executing program 4: 03:55:25 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:25 executing program 2: 03:55:25 executing program 0: 03:55:25 executing program 4: 03:55:25 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x4244, 0x0) 03:55:25 executing program 2: [ 1864.549838] hfsplus: unable to find HFS+ superblock [ 1864.592931] hfsplus: unable to find HFS+ superblock 03:55:25 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x5eb857) accept(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r0, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 03:55:25 executing program 0: 03:55:25 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:25 executing program 4: 03:55:25 executing program 2: 03:55:25 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffffd, 0x0) 03:55:25 executing program 2: 03:55:25 executing program 4: 03:55:25 executing program 0: 03:55:25 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:25 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) accept(r0, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 03:55:25 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffdfd, 0x0) 03:55:25 executing program 4: 03:55:25 executing program 0: 03:55:26 executing program 2: 03:55:26 executing program 4: 03:55:26 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0x0, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:26 executing program 0: 03:55:26 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff7f00000000, 0x0) 03:55:26 executing program 4: 03:55:26 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) accept(r0, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 03:55:26 executing program 2: 03:55:26 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x0, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:26 executing program 4: 03:55:26 executing program 2: 03:55:26 executing program 0: 03:55:26 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x6000000, 0x0) 03:55:26 executing program 4: 03:55:26 executing program 0: 03:55:26 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x0, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:26 executing program 2: 03:55:26 executing program 4: [ 1865.774962] hfsplus: unable to find HFS+ superblock [ 1865.885380] hfsplus: unable to find HFS+ superblock 03:55:27 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x5eb857) accept(r0, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 03:55:27 executing program 4: 03:55:27 executing program 0: 03:55:27 executing program 2: 03:55:27 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x0, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:27 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xd010000, 0x0) 03:55:27 executing program 2: 03:55:27 executing program 0: [ 1866.434457] hfsplus: unable to find HFS+ superblock 03:55:27 executing program 4: 03:55:27 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:27 executing program 2: [ 1866.534215] hfsplus: unable to find HFS+ superblock 03:55:27 executing program 0: 03:55:27 executing program 4: 03:55:27 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x504d, 0x0) 03:55:27 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:55:27 executing program 0: 03:55:27 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000), 0x1c) listen(r0, 0x5eb857) accept(r0, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 03:55:27 executing program 2: socket$inet(0x10, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"0000000000000000000000000200", 0x20000005001}) 03:55:27 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) 03:55:28 executing program 0: quotactl(0x0, 0x0, 0x0, &(0x7f00000001c0)="fc7ea88ef9374fea6b16d82dcb79004ec8ddf9817350d176c03bef9e3771c5b831d7b7047c96b21cfdb2ae12577d36b0a4713139bc5ae638f885d2711fb235765fae6e43dcafa7314be986f27cc25dd6e8001b1a7b26ea07ed150521e2582f1f1a883a3cf36d9a3d60920c64f874c8aa3500af33730cfd03ebebedfa8d5b72c942fd") 03:55:28 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, 0x0, 0x0, 0x0) [ 1867.382421] netlink: 'syz-executor4': attribute type 29 has an invalid length. [ 1867.398103] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. [ 1867.419202] netlink: 'syz-executor4': attribute type 29 has an invalid length. 03:55:28 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) sendto$inet6(r0, &(0x7f0000000280)="4438c585e70f512e93509a49039086dfac76490d01fa25f1342bceb1a2d4e8a436954c8012e88e9212e42768736e8b3657f65a5784620dbf45ad3a7ddbd40fd4ec61179366be0a544d92e7a44259ad27ec7258029c038655df73bd6f365822625ff2789101fb085790b304f8e514a21aa8ac2807e64b774892", 0x79, 0x4008080, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) [ 1867.436864] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. 03:55:28 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/if_inet6\x00') preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/97, 0x61}, {&(0x7f0000000200)=""/244, 0xf4}, {&(0x7f0000000100)=""/146, 0x92}, {0x0}, {&(0x7f0000000080)=""/3, 0x3}, {0x0}], 0x6, 0x0) 03:55:28 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, 0x0, 0x0, 0x0) 03:55:28 executing program 4: getpgrp(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000540)=0x0) syz_open_procfs(r0, &(0x7f0000000580)="6e65742f72610600") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f00000003c0)='./bus\x00', 0x40000000008) fcntl$setstatus(r2, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r3, 0x0, 0xfffffffffffffffc) rmdir(&(0x7f0000000140)='./bus\x00') pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) ioctl$PERF_EVENT_IOC_ID(r5, 0x80042407, &(0x7f0000000380)) read(r4, &(0x7f0000000200)=""/250, 0x50c7e3e3) r6 = socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCEXCL(r3, 0x540c) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r6, &(0x7f0000003940)=[{{&(0x7f0000003680)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-camellia-aesni\x00'}, 0x80, &(0x7f0000003900)=[{&(0x7f00000038c0)="4e7384e7685d3e8ad02d02cca2ff9fbc6ad8c8910f4d649ca32687685b1ee9f7", 0x20}], 0x1, 0x0, 0x0, 0x800}, 0xfffffffffffffb69}], 0x1, 0x4008000) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e24, 0x7, @ipv4={[], [], @loopback}}, 0xffffffffffffff6a) r7 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/mls\x00', 0x0, 0x0) r8 = signalfd(r7, &(0x7f0000000140)={0x80}, 0x8) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r7, &(0x7f00000000c0)) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000300)=0x50) sendmmsg(r6, &(0x7f00000092c0), 0x4ff, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r7, 0x45) ioctl$KIOCSOUND(r4, 0x4b2f, 0x4) sendfile(r2, r3, &(0x7f0000000040), 0x8000fffffffe) fchmod(r8, 0x0) 03:55:28 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff97, 0x0) 03:55:28 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x4, &(0x7f0000000400)={0x2, 0x4e21, @empty}, 0x10) [ 1867.633333] audit: type=1804 audit(2000001328.293:1447): pid=4367 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir738006016/syzkaller.3ld5Td/2063/bus" dev="sda1" ino=17633 res=1 03:55:28 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, 0x0, 0x0, 0x0) [ 1867.958988] syz-executor4 invoked oom-killer: gfp_mask=0x7200c2(GFP_HIGHUSER|__GFP_ACCOUNT), nodemask=(null), order=0, oom_score_adj=0 [ 1867.974157] syz-executor4 cpuset=syz4 mems_allowed=0 [ 1867.979510] CPU: 1 PID: 4367 Comm: syz-executor4 Not tainted 4.20.0-rc6+ #151 [ 1867.986792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1867.992018] Kernel panic - not syncing: corrupted stack end detected inside scheduler [ 1867.996141] Call Trace: [ 1867.996163] dump_stack+0x244/0x39d [ 1867.996184] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1867.996210] dump_header+0x27b/0xf72 [ 1867.996236] ? mark_held_locks+0x130/0x130 [ 1867.996252] ? pagefault_out_of_memory+0x197/0x197 [ 1867.996269] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1867.996287] ? check_preemption_disabled+0x48/0x280 [ 1867.996310] ? zap_class+0x640/0x640 [ 1868.042779] ? __lock_is_held+0xb5/0x140 [ 1868.046855] ? zap_class+0x640/0x640 [ 1868.050579] ? print_usage_bug+0xc0/0xc0 [ 1868.054642] ? find_held_lock+0x36/0x1c0 [ 1868.058704] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1868.064239] ? find_held_lock+0x36/0x1c0 [ 1868.068305] ? mark_held_locks+0xc7/0x130 [ 1868.072455] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1868.077551] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1868.082653] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1868.087238] ? trace_hardirqs_on+0xbd/0x310 [ 1868.091559] ? kasan_check_read+0x11/0x20 [ 1868.095703] ? ___ratelimit+0x3b4/0x672 [ 1868.099680] ? trace_hardirqs_off_caller+0x310/0x310 [ 1868.104791] ? trace_hardirqs_on+0x310/0x310 [ 1868.109193] ? lock_downgrade+0x900/0x900 [ 1868.113357] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1868.118456] ? ___ratelimit+0x3b9/0x672 [ 1868.122426] ? idr_get_free+0xf70/0xf70 [ 1868.126398] ? _raw_spin_unlock_irq+0x27/0x80 [ 1868.130890] ? _raw_spin_unlock_irq+0x27/0x80 [ 1868.135391] oom_kill_process.cold.27+0x10/0x903 [ 1868.140151] ? _raw_spin_unlock_irq+0x27/0x80 [ 1868.144645] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1868.149251] ? oom_evaluate_task+0x540/0x540 [ 1868.153655] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1868.159204] ? cgroup_procs_next+0x70/0x70 [ 1868.163441] ? _raw_spin_unlock_irq+0x60/0x80 [ 1868.167934] ? oom_badness+0xaa0/0xaa0 [ 1868.171845] ? mem_cgroup_scan_tasks+0x1c3/0x1e0 [ 1868.176596] ? mem_cgroup_iter_break+0x30/0x30 [ 1868.181206] ? mark_held_locks+0xc7/0x130 [ 1868.185368] out_of_memory+0xa84/0x1430 [ 1868.189356] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1868.193937] ? kasan_check_read+0x11/0x20 [ 1868.198087] ? oom_killer_disable+0x3a0/0x3a0 [ 1868.202596] mem_cgroup_out_of_memory+0x15e/0x210 [ 1868.207438] ? memory_oom_group_write+0x160/0x160 [ 1868.212273] ? memcg_kmem_charge_memcg+0x7c/0x120 [ 1868.217129] ? page_counter_try_charge+0x1c1/0x220 [ 1868.222059] try_charge+0xda9/0x1700 [ 1868.225785] ? mem_cgroup_from_task+0x1f0/0x1f0 [ 1868.230453] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1868.235378] ? kasan_check_read+0x11/0x20 [ 1868.239518] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1868.244792] ? rcu_softirq_qs+0x20/0x20 [ 1868.248788] ? get_mem_cgroup_from_mm.part.62+0x221/0x880 [ 1868.254327] ? percpu_ref_put_many+0x11c/0x260 [ 1868.258915] ? lock_page_memcg+0x350/0x350 [ 1868.263150] ? lock_acquire+0x1ed/0x520 [ 1868.267124] ? mem_cgroup_oom_control_write+0x100/0x100 [ 1868.272494] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1868.278028] ? check_preemption_disabled+0x48/0x280 [ 1868.283051] memcg_kmem_charge_memcg+0x7c/0x120 [ 1868.287723] ? memcg_kmem_put_cache+0xb0/0xb0 [ 1868.292219] ? __lock_is_held+0xb5/0x140 [ 1868.296281] memcg_kmem_charge+0x149/0x350 [ 1868.300521] __alloc_pages_nodemask+0x75e/0xea0 [ 1868.305191] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 1868.310219] ? perf_trace_sched_process_exec+0x860/0x860 [ 1868.315675] ? kasan_check_write+0x14/0x20 [ 1868.319908] ? copyin+0xb7/0x100 [ 1868.323271] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1868.328287] ? copy_page_from_iter+0x541/0x8f0 [ 1868.332876] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1868.338419] alloc_pages_current+0x173/0x350 [ 1868.342834] pipe_write+0x910/0xec0 [ 1868.346468] __vfs_write+0x6b8/0x9f0 [ 1868.350190] ? kernel_read+0x120/0x120 [ 1868.354074] ? __might_sleep+0x95/0x190 [ 1868.358048] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1868.363593] ? selinux_file_permission+0x90/0x540 [ 1868.368442] ? rw_verify_area+0x118/0x360 [ 1868.372587] vfs_write+0x1fc/0x560 [ 1868.376137] ksys_write+0x101/0x260 [ 1868.379763] ? __ia32_sys_read+0xb0/0xb0 [ 1868.383831] ? trace_hardirqs_off_caller+0x310/0x310 [ 1868.388950] __x64_sys_write+0x73/0xb0 [ 1868.392845] do_syscall_64+0x1b9/0x820 [ 1868.396725] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1868.402099] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1868.407021] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1868.411862] ? trace_hardirqs_on_caller+0x310/0x310 [ 1868.416875] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1868.421911] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1868.426931] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1868.431797] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1868.436988] RIP: 0033:0x457679 [ 1868.440179] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1868.459075] RSP: 002b:00007f2488b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1868.466775] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457679 [ 1868.474043] RDX: 00000000fffffef3 RSI: 00000000200001c0 RDI: 0000000000000006 [ 1868.481329] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1868.488595] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2488b2d6d4 [ 1868.495864] R13: 00000000004c2db5 R14: 00000000004da348 R15: 00000000ffffffff [ 1868.503149] CPU: 0 PID: 4384 Comm: syz-executor4 Not tainted 4.20.0-rc6+ #151 03:55:29 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x5eb857) accept(r0, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 03:55:29 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x23, 0x0) 03:55:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @loopback}, 0xc) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) 03:55:29 executing program 5: memfd_create(&(0x7f0000000040)='--selinuxselinuxselinux\x00', 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x70) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80), 0x0, 0x0) [ 1868.510432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1868.519789] Call Trace: [ 1868.522407] dump_stack+0x244/0x39d [ 1868.526052] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1868.531267] panic+0x2ad/0x55c [ 1868.534473] ? add_taint.cold.5+0x16/0x16 [ 1868.538632] ? lock_downgrade+0x900/0x900 [ 1868.542819] ? lock_downgrade+0x900/0x900 [ 1868.546974] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1868.552528] ? check_preemption_disabled+0x48/0x280 [ 1868.557558] __schedule+0x21c6/0x21d0 [ 1868.561477] ? do_raw_spin_trylock+0x270/0x270 [ 1868.566086] ? lock_pin_lock+0x350/0x350 [ 1868.570153] ? kthread_data+0x58/0xc0 [ 1868.574022] ? __sched_text_start+0x8/0x8 [ 1868.578180] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1868.583321] ? try_to_wake_up+0x11c/0x1440 [ 1868.587576] ? lock_acquire+0x1ed/0x520 [ 1868.587673] kobject: 'loop3' (0000000045fc58b6): kobject_uevent_env [ 1868.591594] ? mem_cgroup_oom_control_write+0x100/0x100 [ 1868.591613] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1868.591632] ? check_preemption_disabled+0x48/0x280 [ 1868.591655] ? ___preempt_schedule_notrace+0x16/0x31 [ 1868.618993] preempt_schedule_notrace+0x70/0x140 [ 1868.623744] ___preempt_schedule_notrace+0x16/0x31 [ 1868.628665] rcu_is_watching+0x23/0x30 [ 1868.632545] rcu_read_lock+0x43/0x70 [ 1868.636245] mem_cgroup_iter+0x208/0x1160 [ 1868.640388] ? wake_up_process+0x10/0x20 [ 1868.644542] ? mem_cgroup_nr_lru_pages+0x80/0x80 [ 1868.649288] ? find_held_lock+0x36/0x1c0 [ 1868.653342] ? __queue_work+0x671/0x1440 [ 1868.657389] ? lock_downgrade+0x900/0x900 [ 1868.661520] ? check_flush_dependency+0x410/0x410 [ 1868.666356] ? kasan_check_read+0x11/0x20 [ 1868.670492] ? do_raw_spin_unlock+0xa7/0x330 [ 1868.674889] ? do_raw_spin_trylock+0x270/0x270 [ 1868.679459] ? ___preempt_schedule+0x16/0x18 [ 1868.684048] ? _raw_spin_unlock+0x3f/0x50 [ 1868.688186] shrink_node+0x340/0x16b0 [ 1868.691993] ? shrink_node_memcg+0x18f0/0x18f0 [ 1868.696562] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1868.701132] ? trace_hardirqs_on+0xbd/0x310 [ 1868.705439] ? vmpressure+0x271/0x340 [ 1868.709236] ? do_raw_spin_trylock+0x270/0x270 [ 1868.713835] ? queue_work_on+0x12c/0x1e0 [ 1868.717881] ? vmpressure+0x1a2/0x340 [ 1868.721676] do_try_to_free_pages+0x3e7/0x1290 [ 1868.726245] ? trace_hardirqs_off_caller+0x310/0x310 [ 1868.731339] ? shrink_node+0x16b0/0x16b0 [ 1868.735385] ? _raw_spin_unlock_irq+0x60/0x80 [ 1868.739867] ? psi_memstall_enter+0x24f/0x2c0 [ 1868.744345] ? __lock_is_held+0xb5/0x140 [ 1868.748395] ? psi_memstall_tick+0x230/0x230 [ 1868.752836] try_to_free_mem_cgroup_pages+0x4cf/0xcd0 [ 1868.758013] ? try_to_free_pages+0xb90/0xb90 [ 1868.762424] ? preempt_schedule+0x4d/0x60 [ 1868.766571] ? _raw_spin_unlock_irqrestore+0xbb/0xd0 [ 1868.771663] ? cgroup_file_notify+0x226/0x2f0 [ 1868.776168] ? cgroup_procs_write_finish+0xf0/0xf0 [ 1868.781084] ? trace_hardirqs_on+0xbd/0x310 [ 1868.785397] ? mem_cgroup_try_charge+0x627/0xe20 [ 1868.790156] ? page_counter_try_charge+0x1c1/0x220 [ 1868.795105] try_charge+0x521/0x1700 [ 1868.798809] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1868.803854] ? kasan_check_read+0x11/0x20 [ 1868.807995] ? mem_cgroup_from_task+0x1f0/0x1f0 [ 1868.812656] ? get_mem_cgroup_from_mm.part.62+0x221/0x880 [ 1868.818179] ? lock_page_memcg+0x350/0x350 [ 1868.822404] ? lock_acquire+0x1ed/0x520 [ 1868.826368] ? mem_cgroup_oom_control_write+0x100/0x100 [ 1868.831832] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1868.837359] ? check_preemption_disabled+0x48/0x280 [ 1868.842362] ? kasan_check_read+0x11/0x20 [ 1868.846515] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1868.851791] ? rcu_softirq_qs+0x20/0x20 [ 1868.855755] ? __lock_acquire+0x62f/0x4c20 [ 1868.860010] mem_cgroup_try_charge+0x627/0xe20 [ 1868.864595] ? __lock_acquire+0x62f/0x4c20 [ 1868.868815] ? mem_cgroup_protected+0xa60/0xa60 [ 1868.873473] ? zap_class+0x640/0x640 [ 1868.877179] ? mark_held_locks+0x130/0x130 [ 1868.881406] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1868.886929] ? PageHuge+0x183/0x2b0 [ 1868.890555] ? vma_kernel_pagesize+0xb0/0xb0 [ 1868.894950] ? find_held_lock+0x36/0x1c0 [ 1868.898999] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1868.904525] ? mark_page_accessed+0xcaf/0x2040 [ 1868.909104] ? activate_page+0x1040/0x1040 [ 1868.913328] ? find_get_entry+0xa87/0x1120 [ 1868.917552] __add_to_page_cache_locked+0x793/0x1840 [ 1868.922639] ? zap_class+0x640/0x640 [ 1868.926346] ? find_lock_entry+0x8e0/0x8e0 [ 1868.930569] ? zap_class+0x640/0x640 [ 1868.934271] ? check_preemption_disabled+0x48/0x280 [ 1868.939313] ? count_shadow_nodes+0x670/0x670 [ 1868.944234] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1868.949328] ? find_held_lock+0x36/0x1c0 [ 1868.953490] ? zap_class+0x640/0x640 [ 1868.957202] ? find_get_entry+0xa87/0x1120 [ 1868.961424] ? lock_downgrade+0x900/0x900 [ 1868.965558] ? check_preemption_disabled+0x48/0x280 [ 1868.970584] ? zap_class+0x640/0x640 [ 1868.974301] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1868.979861] ? check_preemption_disabled+0x48/0x280 [ 1868.984871] ? __lock_is_held+0xb5/0x140 [ 1868.988929] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1868.993932] ? __alloc_pages_nodemask+0xb87/0xea0 [ 1868.998770] add_to_page_cache_lru+0x355/0xdb0 [ 1869.003357] ? add_to_page_cache_locked+0x40/0x40 [ 1869.008188] ? print_usage_bug+0xc0/0xc0 [ 1869.012240] ? pagecache_get_page+0x2d8/0xf00 [ 1869.016727] ? add_to_page_cache_lru+0xdb0/0xdb0 [ 1869.021482] ? __lock_acquire+0x62f/0x4c20 [ 1869.025708] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1869.031239] ? alloc_pages_current+0x17b/0x350 [ 1869.035830] ? __page_cache_alloc+0x191/0x5c0 [ 1869.040312] ? mark_held_locks+0x130/0x130 [ 1869.044545] ? generic_perform_write+0x6a0/0x6a0 [ 1869.049289] ? __lock_is_held+0xb5/0x140 [ 1869.053341] pagecache_get_page+0x53a/0xf00 [ 1869.057659] ? add_to_page_cache_lru+0xdb0/0xdb0 [ 1869.062523] ? perf_trace_sched_process_exec+0x860/0x860 [ 1869.067968] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1869.073500] ? zap_class+0x640/0x640 [ 1869.077202] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1869.082901] ? ext4_mb_load_buddy_gfp+0x12fc/0x1e70 [ 1869.087913] ? __lock_is_held+0xb5/0x140 [ 1869.091975] ? perf_trace_sched_process_exec+0x860/0x860 [ 1869.097424] ? print_usage_bug+0xc0/0xc0 [ 1869.101478] ? lock_downgrade+0x900/0x900 [ 1869.105615] ? print_usage_bug+0xc0/0xc0 [ 1869.109759] ? __might_sleep+0x95/0x190 [ 1869.113733] ext4_mb_load_buddy_gfp+0xddf/0x1e70 [ 1869.118529] ? __ext4_handle_dirty_metadata+0x1e0/0x5a0 [ 1869.123887] ? ext4_mb_good_group+0x730/0x730 [ 1869.128386] ? mark_held_locks+0x130/0x130 [ 1869.132617] ? find_held_lock+0x36/0x1c0 [ 1869.136667] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1869.142204] ? ext4_mb_unload_buddy.isra.22+0x391/0x510 [ 1869.147555] ? ext4_try_merge_freed_extent+0x5e0/0x5e0 [ 1869.152816] ? ext4_mb_find_by_goal+0xcb0/0x14f0 [ 1869.157562] ? lock_downgrade+0x900/0x900 [ 1869.161706] ? do_raw_spin_trylock+0x270/0x270 [ 1869.166275] ? zap_class+0x640/0x640 [ 1869.169980] ? zap_class+0x640/0x640 [ 1869.173684] ? find_held_lock+0x36/0x1c0 [ 1869.177738] ? __lock_is_held+0xb5/0x140 [ 1869.181798] ? lock_downgrade+0x900/0x900 [ 1869.185943] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 1869.191134] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1869.196137] ? ext4_mb_good_group+0x551/0x730 [ 1869.200630] ext4_mb_regular_allocator+0x634/0x1590 [ 1869.205658] ? ext4_mb_complex_scan_group+0xb10/0xb10 [ 1869.210850] ? ext4_mb_generate_buddy+0x960/0x960 [ 1869.215693] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1869.220698] ? kmem_cache_alloc+0x33a/0x730 [ 1869.225093] ext4_mb_new_blocks+0x1de3/0x4840 [ 1869.229590] ? find_held_lock+0x36/0x1c0 [ 1869.233658] ? ext4_discard_preallocations+0x1900/0x1900 [ 1869.239101] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1869.244020] ? kasan_check_read+0x11/0x20 [ 1869.248156] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1869.253419] ? rcu_softirq_qs+0x20/0x20 [ 1869.257379] ? rcu_softirq_qs+0x20/0x20 [ 1869.261343] ? unwind_dump+0x190/0x190 [ 1869.265225] ? is_bpf_text_address+0xd3/0x170 [ 1869.269708] ? kernel_text_address+0x79/0xf0 [ 1869.274109] ? __kernel_text_address+0xd/0x40 [ 1869.278594] ? unwind_get_return_address+0x61/0xa0 [ 1869.283515] ? __save_stack_trace+0x8d/0xf0 [ 1869.287833] ? save_stack+0xa9/0xd0 [ 1869.291447] ? save_stack+0x43/0xd0 [ 1869.295061] ? kasan_kmalloc+0xc7/0xe0 [ 1869.298950] ? __kmalloc+0x15b/0x760 [ 1869.302653] ? ext4_find_extent+0x757/0x9b0 [ 1869.306971] ? ext4_ext_map_blocks+0x291/0x48f0 [ 1869.311627] ? ext4_map_blocks+0x8f7/0x1b50 [ 1869.315936] ? _ext4_get_block+0x226/0x6d0 [ 1869.320161] ? ext4_get_block_trans+0x1a6/0x2e0 [ 1869.324819] ? ext4_dio_get_block_unwritten_sync+0x66/0xf0 [ 1869.330435] ? do_direct_IO+0x1941/0xc110 [ 1869.334578] ? do_blockdev_direct_IO+0xc30/0x9db0 [ 1869.339405] ? __blockdev_direct_IO+0x9d/0xc6 [ 1869.343885] ? ext4_direct_IO+0xbe6/0x2230 [ 1869.348109] ? generic_file_direct_write+0x275/0x4b0 [ 1869.353204] ? __generic_file_write_iter+0x2ff/0x630 [ 1869.358292] ? ext4_file_write_iter+0x390/0x1420 [ 1869.363035] ? do_iter_readv_writev+0x8b0/0xa80 [ 1869.367691] ? do_iter_write+0x185/0x5f0 [ 1869.371750] ? vfs_iter_write+0x77/0xb0 [ 1869.375709] ? iter_file_splice_write+0x90d/0x1050 [ 1869.380658] ? direct_splice_actor+0x128/0x190 [ 1869.385224] ? splice_direct_to_actor+0x3ad/0x9d0 [ 1869.390052] ? do_splice_direct+0x2d4/0x420 [ 1869.394359] ? do_sendfile+0x62a/0xe20 [ 1869.398249] ? __x64_sys_sendfile64+0x15d/0x250 [ 1869.402915] ? do_syscall_64+0x1b9/0x820 [ 1869.406976] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1869.412331] ? zap_class+0x640/0x640 [ 1869.416048] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1869.421572] ? check_preemption_disabled+0x48/0x280 [ 1869.426587] ? __lock_is_held+0xb5/0x140 [ 1869.430640] ? zap_class+0x640/0x640 [ 1869.434360] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1869.439882] ? check_preemption_disabled+0x48/0x280 [ 1869.444903] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1869.450438] ? ext4_ext_search_right+0x2e1/0xb10 [ 1869.455184] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1869.460711] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1869.465735] ext4_ext_map_blocks+0x2724/0x48f0 [ 1869.470327] ? ext4_ext_release+0x10/0x10 [ 1869.474464] ? zap_class+0x640/0x640 [ 1869.478166] ? zap_class+0x640/0x640 [ 1869.481868] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1869.487394] ? check_preemption_disabled+0x48/0x280 [ 1869.492500] ? lock_acquire+0x1ed/0x520 [ 1869.496460] ? ext4_map_blocks+0x88f/0x1b50 [ 1869.500772] ? lock_release+0xa00/0xa00 [ 1869.504742] ? perf_trace_sched_process_exec+0x860/0x860 [ 1869.510189] ? ext4_es_cache_extent+0x6a0/0x6a0 [ 1869.514858] ? down_write+0x8a/0x130 [ 1869.518559] ? ext4_map_blocks+0x88f/0x1b50 [ 1869.522881] ? down_read+0x120/0x120 [ 1869.526588] ? __check_block_validity.constprop.80+0xd9/0x210 [ 1869.532462] ext4_map_blocks+0x8f7/0x1b50 [ 1869.536605] ? ext4_issue_zeroout+0x190/0x190 [ 1869.541091] ? ext4_journal_check_start+0x18e/0x220 [ 1869.546097] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1869.551621] _ext4_get_block+0x226/0x6d0 [ 1869.555670] ? ext4_map_blocks+0x1b50/0x1b50 [ 1869.560067] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1869.565594] ? ext4_meta_trans_blocks+0x25f/0x310 [ 1869.570426] ext4_get_block_trans+0x1a6/0x2e0 [ 1869.574914] ? ext4_dio_get_block_overwrite+0x100/0x100 [ 1869.580267] ? _copy_to_iter_mcsafe+0x1680/0x1680 [ 1869.585103] ext4_dio_get_block_unwritten_sync+0x66/0xf0 [ 1869.590546] do_direct_IO+0x1941/0xc110 [ 1869.594530] ? sb_init_dio_done_wq+0x90/0x90 [ 1869.598929] ? attach_entity_load_avg+0x860/0x860 [ 1869.603761] ? print_usage_bug+0xc0/0xc0 [ 1869.607813] ? update_load_avg+0x387/0x2470 [ 1869.612124] ? __lock_acquire+0x62f/0x4c20 [ 1869.616350] ? attach_entity_load_avg+0x860/0x860 [ 1869.621188] ? __lock_acquire+0x62f/0x4c20 [ 1869.625482] ? dd_has_work+0xbb/0x230 [ 1869.629276] ? dd_prepare_request+0x10/0x10 [ 1869.633586] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1869.639108] ? blk_mq_do_dispatch_sched+0x443/0x580 [ 1869.644120] ? mark_held_locks+0x130/0x130 [ 1869.648358] ? print_usage_bug+0xc0/0xc0 [ 1869.652408] ? find_held_lock+0x36/0x1c0 [ 1869.656474] ? __lock_acquire+0x62f/0x4c20 [ 1869.660694] ? print_usage_bug+0xc0/0xc0 [ 1869.664749] ? lock_downgrade+0x900/0x900 [ 1869.668884] ? print_usage_bug+0xc0/0xc0 [ 1869.672946] ? mark_held_locks+0xc7/0x130 [ 1869.677085] ? free_unref_page_list+0xd1b/0x11e0 [ 1869.681825] ? zap_class+0x640/0x640 [ 1869.685526] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1869.690099] ? trace_hardirqs_on+0xbd/0x310 [ 1869.694427] ? find_held_lock+0x36/0x1c0 [ 1869.698482] ? is_bpf_text_address+0xac/0x170 [ 1869.702967] ? lock_downgrade+0x900/0x900 [ 1869.707104] ? check_preemption_disabled+0x48/0x280 [ 1869.712109] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1869.717025] ? kasan_check_read+0x11/0x20 [ 1869.721180] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1869.726444] ? rcu_softirq_qs+0x20/0x20 [ 1869.730412] ? rcu_softirq_qs+0x20/0x20 [ 1869.734370] ? unwind_dump+0x190/0x190 [ 1869.738249] ? is_bpf_text_address+0xd3/0x170 [ 1869.742748] ? kernel_text_address+0x79/0xf0 [ 1869.747146] ? __kernel_text_address+0xd/0x40 [ 1869.751629] ? unwind_get_return_address+0x61/0xa0 [ 1869.756551] ? __save_stack_trace+0x8d/0xf0 [ 1869.760870] ? save_stack+0xa9/0xd0 [ 1869.764485] ? save_stack+0x43/0xd0 [ 1869.768099] ? kasan_kmalloc+0xc7/0xe0 [ 1869.771973] ? kasan_slab_alloc+0x12/0x20 [ 1869.776107] ? kmem_cache_alloc+0x12e/0x730 [ 1869.780413] ? do_blockdev_direct_IO+0x633/0x9db0 [ 1869.785241] ? __blockdev_direct_IO+0x9d/0xc6 [ 1869.789728] ? ext4_direct_IO+0xbe6/0x2230 [ 1869.793950] ? generic_file_direct_write+0x275/0x4b0 [ 1869.799542] ? __generic_file_write_iter+0x2ff/0x630 [ 1869.804645] ? ext4_file_write_iter+0x390/0x1420 [ 1869.809388] ? do_iter_readv_writev+0x8b0/0xa80 [ 1869.814044] ? do_iter_write+0x185/0x5f0 [ 1869.818092] ? vfs_iter_write+0x77/0xb0 [ 1869.822074] ? iter_file_splice_write+0x90d/0x1050 [ 1869.826995] ? direct_splice_actor+0x128/0x190 [ 1869.831565] ? splice_direct_to_actor+0x3ad/0x9d0 [ 1869.836395] ? do_splice_direct+0x2d4/0x420 [ 1869.840715] ? do_sendfile+0x62a/0xe20 [ 1869.844598] ? __x64_sys_sendfile64+0x15d/0x250 [ 1869.849255] ? do_syscall_64+0x1b9/0x820 [ 1869.853319] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1869.858671] ? find_held_lock+0x36/0x1c0 [ 1869.862740] ? zap_class+0x640/0x640 [ 1869.866445] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1869.871985] ? check_preemption_disabled+0x48/0x280 [ 1869.877093] ? blk_start_plug+0xcc/0x370 [ 1869.881156] ? blk_lld_busy+0x70/0x70 [ 1869.884953] ? iov_iter_for_each_range+0xc90/0xc90 [ 1869.889881] do_blockdev_direct_IO+0xc30/0x9db0 [ 1869.894540] ? write_end_fn+0xf0/0xf0 [ 1869.898330] ? do_direct_IO+0xc110/0xc110 [ 1869.902482] ? check_preemption_disabled+0x48/0x280 [ 1869.907493] ? __lock_is_held+0xb5/0x140 [ 1869.911559] ? ext4_dio_get_block_unwritten_async+0x260/0x260 [ 1869.917445] ? filemap_fault+0x25f0/0x25f0 [ 1869.921666] ? zap_class+0x640/0x640 [ 1869.925384] ? print_usage_bug+0xc0/0xc0 [ 1869.929450] ? print_usage_bug+0xc0/0xc0 [ 1869.933504] ? find_held_lock+0x36/0x1c0 [ 1869.937554] ? mark_held_locks+0xc7/0x130 [ 1869.941705] ? __lock_acquire+0x62f/0x4c20 [ 1869.945930] ? trace_hardirqs_on+0xbd/0x310 [ 1869.950236] ? kasan_check_read+0x11/0x20 [ 1869.954372] ? pagevec_lru_move_fn+0x259/0x350 [ 1869.958943] ? trace_hardirqs_off_caller+0x310/0x310 [ 1869.964257] ? mark_held_locks+0x130/0x130 [ 1869.968490] ? perf_trace_sched_process_exec+0x860/0x860 [ 1869.973930] ? pagevec_lookup_entries+0x3a/0x80 [ 1869.978587] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1869.984210] ? invalidate_inode_pages2_range+0x15ef/0x1cb0 [ 1869.989835] ? zap_class+0x640/0x640 [ 1869.993538] ? pagecache_isize_extended+0x440/0x440 [ 1869.998542] ? zap_class+0x640/0x640 [ 1870.002259] ? __might_sleep+0x95/0x190 [ 1870.006230] ? zap_class+0x640/0x640 [ 1870.009932] ? __lock_is_held+0xb5/0x140 [ 1870.013985] ? find_held_lock+0x36/0x1c0 [ 1870.018043] ? ext4_direct_IO+0x14dc/0x2230 [ 1870.022351] ? lock_downgrade+0x900/0x900 [ 1870.026491] ? lock_release+0xa00/0xa00 [ 1870.030449] ? perf_trace_sched_process_exec+0x860/0x860 [ 1870.035899] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1870.041442] ? ext4_journal_check_start+0x18e/0x220 [ 1870.046456] ? ext4_dio_get_block_unwritten_async+0x260/0x260 [ 1870.052328] __blockdev_direct_IO+0x9d/0xc6 [ 1870.056646] ? write_end_fn+0xf0/0xf0 [ 1870.060443] ext4_direct_IO+0xbe6/0x2230 [ 1870.064493] ? ext4_dio_get_block_unwritten_async+0x260/0x260 [ 1870.070371] ? ext4_iomap_end+0x810/0x810 [ 1870.074509] ? wbc_attach_and_unlock_inode+0xa30/0xa30 [ 1870.079772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1870.085305] ? __filemap_fdatawrite_range+0x2ab/0x4a0 [ 1870.090503] ? delete_from_page_cache_batch+0x1640/0x1640 [ 1870.096033] ? __mnt_drop_write_file+0x31/0x40 [ 1870.100606] ? file_update_time+0xe4/0x640 [ 1870.104830] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1870.110356] ? filemap_check_errors+0xd8/0x110 [ 1870.114930] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1870.120455] generic_file_direct_write+0x275/0x4b0 [ 1870.125376] __generic_file_write_iter+0x2ff/0x630 [ 1870.130293] ext4_file_write_iter+0x390/0x1420 [ 1870.134867] ? ext4_file_mmap+0x410/0x410 [ 1870.139040] ? __lock_is_held+0xb5/0x140 [ 1870.143092] ? iter_file_splice_write+0x260/0x1050 [ 1870.148009] ? do_syscall_64+0x1b9/0x820 [ 1870.152059] ? perf_trace_sched_process_exec+0x860/0x860 [ 1870.157531] ? __might_sleep+0x95/0x190 [ 1870.161511] do_iter_readv_writev+0x8b0/0xa80 [ 1870.165999] ? vfs_dedupe_file_range+0x700/0x700 [ 1870.170747] ? rw_verify_area+0x118/0x360 [ 1870.174890] do_iter_write+0x185/0x5f0 [ 1870.178777] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1870.184302] vfs_iter_write+0x77/0xb0 [ 1870.188093] iter_file_splice_write+0x90d/0x1050 [ 1870.192851] ? page_cache_pipe_buf_release+0x310/0x310 [ 1870.198129] ? selinux_file_permission+0x90/0x540 [ 1870.202964] ? rw_verify_area+0x118/0x360 [ 1870.207099] ? page_cache_pipe_buf_release+0x310/0x310 [ 1870.212367] direct_splice_actor+0x128/0x190 [ 1870.216768] splice_direct_to_actor+0x3ad/0x9d0 [ 1870.221423] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1870.226948] ? pipe_to_sendpage+0x400/0x400 [ 1870.231350] ? do_splice_to+0x190/0x190 [ 1870.235310] ? security_file_permission+0x1c2/0x220 [ 1870.240319] ? rw_verify_area+0x118/0x360 [ 1870.244459] do_splice_direct+0x2d4/0x420 [ 1870.248601] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1870.253436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1870.258978] ? __sb_start_write+0x1b2/0x370 [ 1870.263300] do_sendfile+0x62a/0xe20 [ 1870.267014] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1870.271587] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1870.277196] ? _copy_from_user+0xdf/0x150 [ 1870.281332] __x64_sys_sendfile64+0x15d/0x250 [ 1870.285817] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1870.290392] do_syscall_64+0x1b9/0x820 [ 1870.294263] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1870.299612] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1870.304542] ? trace_hardirqs_on_caller+0x310/0x310 [ 1870.309546] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1870.314550] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1870.321201] ? __switch_to_asm+0x40/0x70 [ 1870.325247] ? __switch_to_asm+0x34/0x70 [ 1870.329316] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1870.334148] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1870.339325] RIP: 0033:0x457679 [ 1870.342507] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1870.361410] RSP: 002b:00007f2488ac9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1870.369103] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457679 [ 1870.376379] RDX: 0000000020000040 RSI: 0000000000000004 RDI: 0000000000000003 [ 1870.383636] RBP: 000000000072c0e0 R08: 0000000000000000 R09: 0000000000000000 [ 1870.390902] R10: 00008000fffffffe R11: 0000000000000246 R12: 00007f2488aca6d4 [ 1870.398154] R13: 00000000004c3e2b R14: 00000000004d6c40 R15: 00000000ffffffff [ 1870.407187] Kernel Offset: disabled [ 1870.411148] Rebooting in 86400 seconds..