2581371960fc177a81e3e0d15eb6a457c6fde47248a2820f50ded9973eef959a4bff58603ef2d7ecfe", 0xdc, 0x3}], 0x2800001, &(0x7f0000002840)={[{@noextent_cache='noextent_cache'}, {@fastboot='fastboot'}, {@noinline_dentry='noinline_dentry'}, {@six_active_logs='active_logs=6'}, {@flush_merge='flush_merge'}, {@test_dummy_encryption='test_dummy_encryption'}, {@six_active_logs='active_logs=6'}, {@inline_data='inline_data'}, {@prjquota={'prjquota', 0x3d, 'skcipher\x00'}}, {@four_active_logs='active_logs=4'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'GPL'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) recvmsg(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 12:06:03 executing program 1: 12:06:03 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepa%e', 0x3d, 'none'}}]}) 12:06:03 executing program 3: 12:06:03 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x1a0f0000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:03 executing program 1: [ 749.629317] hfs: unable to parse mount options [ 749.699139] hfs: unable to parse mount options [ 749.734389] hfs: unable to load codepage "none" [ 749.739792] hfs: unable to parse mount options [ 749.781907] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x2e130a1) [ 749.844507] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 749.856472] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 749.863662] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock [ 749.878224] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x2e130a1) [ 749.878257] kvm: vcpu 0: requested 34784 ns lapic timer period limited to 200000 ns [ 749.896054] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 749.942600] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 749.979376] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock 12:06:04 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x40, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000480)={0x79, 0x0, [0x404]}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000040)=0x10) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000001940)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfe2f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f0000000100)) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet6(0xa, 0x4, 0x0) 12:06:04 executing program 3: 12:06:04 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepaBe', 0x3d, 'none'}}]}) 12:06:04 executing program 1: 12:06:04 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x1f000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:04 executing program 1: [ 750.131194] hfs: unable to parse mount options [ 750.208050] hfs: unable to parse mount options [ 750.230477] hfs: unable to load codepage "none" [ 750.235565] hfs: unable to parse mount options [ 750.348722] hfs: unable to load codepage "none" [ 750.362627] hfs: unable to parse mount options [ 750.485581] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x2e130a1) [ 750.497104] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 750.506297] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 750.513499] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock [ 750.553226] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x2e130a1) 12:06:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) r1 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x145, 0x210000) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r2 = socket$kcm(0x2b, 0x1, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'veth1_to_bridge\x00', 0x800}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYRES64], 0xfffffd34) recvmsg(r4, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f00000000c0)={0x1, 0x2, 0x27, 0x2}, 0x8) 12:06:04 executing program 3: 12:06:04 executing program 1: 12:06:04 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepaCe', 0x3d, 'none'}}]}) 12:06:04 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 750.595643] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 750.603387] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 750.613794] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock 12:06:04 executing program 1: [ 750.742480] hfs: unable to parse mount options [ 750.795458] hfs: unable to load codepage "none" [ 750.800413] hfs: unable to parse mount options [ 750.841154] hfs: unable to parse mount options 12:06:05 executing program 2: openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000480)={0x79, 0x0, [0x404]}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000001940)={"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"}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f0000000100)) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet6(0xa, 0x0, 0x0) getpeername$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14) setsockopt$packet_drop_memb(r4, 0x107, 0x2, &(0x7f0000000180)={r5, 0x1, 0x6}, 0x10) 12:06:05 executing program 3: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000005ed0050bfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000012d400500000000005504000001ed00001d040000000000002c460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], 0x0}, 0x48) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000400)=0x8, 0x4) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f0000002780)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000002b80)=[{&(0x7f00000028c0)=""/221, 0xdd}, {&(0x7f0000002a80)=""/247, 0xf7}], 0x2, &(0x7f0000002bc0)=""/151, 0x97}, 0xa5}], 0x1, 0x100, &(0x7f00000001c0)={0x0, 0x1c9c380}) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)='bpf\x00', 0x80080, &(0x7f0000000540)=ANY=[]) recvmmsg(0xffffffffffffffff, &(0x7f0000008e00)=[{{&(0x7f0000008480)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000008500), 0x0, &(0x7f0000008540)=""/21, 0x15}}, {{&(0x7f0000008580)=@alg, 0x80, &(0x7f00000087c0)=[{&(0x7f0000008600)=""/15, 0xf}, {&(0x7f00000086c0)=""/18, 0x12}, {&(0x7f0000008780)=""/36, 0x24}], 0x3, 0x0, 0x0, 0x5}, 0x8}, {{&(0x7f0000008840)=@in6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000008d40)=[{&(0x7f00000088c0)=""/82, 0x52}, {&(0x7f0000008940)=""/49, 0x31}, {&(0x7f0000008980)=""/215, 0xd7}, {&(0x7f0000008c00)=""/125, 0x7d}, {&(0x7f0000008d00)=""/42, 0x2a}], 0x5, 0x0, 0x0, 0x6}, 0x20000000000}], 0x3, 0x41, &(0x7f0000008f40)) prctl$PR_SET_KEEPCAPS(0x8, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000008fc0)='IPVS\x00') ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000440)) 12:06:05 executing program 1: fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) add_key(&(0x7f0000000100)='rxrpc\x00', 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x10, 0xffffffffffffffff, 0x1000000000) unshare(0x10040100) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000300)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') close(0xffffffffffffffff) creat(&(0x7f0000000100)='./bus\x00', 0x1) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x401) 12:06:05 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepaDe', 0x3d, 'none'}}]}) 12:06:05 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x20100000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 751.189891] hfs: unable to parse mount options [ 751.205462] device lo entered promiscuous mode 12:06:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") r1 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) r2 = dup(r1) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0505405, 0x0) [ 751.283911] hfs: unable to parse mount options [ 751.337617] hfs: unable to load codepage "none" [ 751.342436] hfs: unable to parse mount options 12:06:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYRES64], 0xfffffd34) r3 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x9, 0x2000) ioctl$RTC_ALM_SET(r3, 0x40247007, &(0x7f0000000040)={0xffffffffffffff36, 0x22, 0x15, 0x12, 0xa, 0x3, 0x4, 0x13b}) recvmsg(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 12:06:05 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepaEe', 0x3d, 'none'}}]}) 12:06:05 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 751.656379] hfs: unable to parse mount options [ 751.713503] hfs: unable to parse mount options [ 751.725759] hfs: unable to load codepage "none" [ 751.730546] hfs: unable to parse mount options 12:06:05 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepaFe', 0x3d, 'none'}}]}) 12:06:05 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, 0x0, 0x7561c167f95c45f) sendmmsg(r2, &(0x7f00000002c0), 0x4cc, 0x0) r3 = openat(0xffffffffffffff9c, 0x0, 0x10000, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000200)=r1) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000002c0)) open$dir(&(0x7f0000000000)='./file0\x00', 0x4000, 0x2) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000280)=0xffffffff) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0xfffffffffffffed2) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000001c0)={0x5}) [ 751.891345] hfs: unable to load codepage "none" [ 751.896676] hfs: unable to parse mount options 12:06:05 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x40000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 751.983659] hfs: unable to parse mount options [ 752.130392] kvm: vcpu 0: requested 34784 ns lapic timer period limited to 200000 ns [ 752.189548] hfs: unable to parse mount options [ 752.268804] hfs: unable to load codepage "none" [ 752.289276] hfs: unable to parse mount options 12:06:06 executing program 2: openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000480)={0x79, 0x0, [0x404]}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000001940)={"a523fb9656eb871ffcd7ffeb51d84e738a55eba841ae487e33cdd921e8a51ce6c924020f0ac3562dd8cdeb31deac16f46da4ac16ee8165bce439eddce671c5b0a1103ea3f86a43cbb78504f6f9c77c2f09dc27632ec6036ee52a87e321e707c0cfe15576c26d52d0334c8d4693e127b3a046a5ed7796c9c5017cfd58ec871ed76369846fea9ebfa2f7f96496abf4ef57ed1ecd930eb9e13396875f01e932804ffe8a34c8fbedd97cdfb3176ec59fbbfd20a6ff17795431c341a35eb0f5f703480a5211cc6a7e2084e4a9b6aedf60b7b8084b00ca2cbed255b4cc4679c967432fea5e95119f9635e94794aab6ef54f290677fa08d0ee2cc8eae468efd02417055d3f3ccc86b629dfb878c4d115c16c75fe352cffa93648cf49577256b5d2faf0634335c97ffff966ae90cbf81250df3613c25d2789c869c9cc95a6e9d364c4c684059c593f9950e66cf81cd9f36d73fade4f0cbb795010364d13ff32c12efd91d0ebb6533700945f2db6113a630bd521eec89a74c46e1733b72d6e4d2ccee3b40f99809a9a4fb5fc2d1c53e1366d455bcbe81893100ab56b2556b55c1a0c5787356b464c3bf7011488e55f587a6d4420d46d69a74ee5bbfbcb0d6cb00aae8c3dfd6dd2e9f76d7a542f20553207b668dce69f1b463ee9166e81bb109f461b8885f15c9e525d72260ccdbd69e3345612158114780b9409ea856cb724faa6ed27ba836b35c10e7c7d43f2fa34f98f16a00f31565e16a213eaf4a7f438c89733ebe6d16328b930fd942bc64d631dd1f2aa1cc2ccdaff2324076c83e1ba4d2a0e40e010c96b42e7a4a76cd7a89ef592b9b3030f62d9fbd565ee5908ab90b42620b61e5d1e08621a31d21003cd12a450461636472fa64a7e1b98778bfb482fb4b4da31b42ee98b10f9c0f4c085d08c37ee2e3a9e4a5aff72a0ab844fcbfa224842c85f6cdfd25829c44760e3859624f891df4824f7d17938ac2dee1412cf3083e1d5ee2d29b63267ccba535409da7bef05d3fa79a3ef037ee609e01ad345ee17f48b5e8510f767de35df4dfb856f7533ad88866c6b01fe345107ba7191a8809e2e014492acf9c4f35cad664198a65c55f884490f4b30b4526324be842c393f336f16bea2bf6c6b917fdb751e12ff689ab4ffa44625a8b2bc1de4e88682abe5ce9d1942792747681ad23c31046d825140987f19a9cf10323c3f50a20f35a6d1dd8ca6758296b4537a0da1a853011b777623c8774b3689897cf9264a7782470847f36a8093f04000000663438ab39d8a777fb3e10cb4a2402a939a98d387087c5ca5fd8fbc4d96ae698b5bb84a0a8484e2b85743e623a033eb5b1889ccfb4b95885bc69d4c1cb819b95e7923e557c9ec9ec10e94d1e1295fc2f256fa095036f6cfc04c414fc57fc72c120614a586089c93741e97a61c46600"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfe2f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000001, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f0000000100)) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet6(0xa, 0x0, 0x0) 12:06:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000064, 0x0) 12:06:06 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepaGe', 0x3d, 'none'}}]}) [ 752.462595] hfs: unable to load codepage "none" [ 752.474810] hfs: unable to parse mount options 12:06:06 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x48000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 752.528655] hfs: unable to parse mount options 12:06:06 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(0xffffffffffffffff, 0x0, 0x7561c167f95c45f) sendmmsg(r2, &(0x7f00000002c0), 0x4cc, 0x0) r3 = openat(0xffffffffffffff9c, 0x0, 0x10000, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000200)=r1) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r4, 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000002c0)) open$dir(&(0x7f0000000000)='./file0\x00', 0x4000, 0x2) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000280)=0xffffffff) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0xfffffffffffffed2) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000001c0)={0x5}) 12:06:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000000)={'yam0\x00', 0x4}) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYRES64], 0xfffffd34) recvmsg(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 752.618896] hfs: unable to parse mount options 12:06:06 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepaIe', 0x3d, 'none'}}]}) [ 752.913656] hfs: unable to load codepage "none" [ 752.933079] hfs: unable to parse mount options [ 752.950281] hfs: unable to parse mount options [ 753.081160] hfs: unable to parse mount options 12:06:07 executing program 1: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x10000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:07 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepaKe', 0x3d, 'none'}}]}) [ 753.154636] hfs: unable to load codepage "none" [ 753.159529] hfs: unable to parse mount options 12:06:07 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:07 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000919000/0x400000)=nil, 0x400000, 0xffffffffffffffff, 0x8031, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vga_arbiter\x00', 0x50200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0xcbfc6160cbaf4ab3, 0xfa00, {0x4, &(0x7f0000000440), 0x10d, 0xa}}, 0xfffffc38) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f00000001c0)) openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x2, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x480, 0x0) ioctl$VHOST_SET_FEATURES(r3, 0x4008af00, &(0x7f0000000500)=0xc00001d) setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, &(0x7f0000000200), 0x4) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e21, 0x0, @mcast1, 0x2}}, 0xffffffff, 0xf79}, &(0x7f00000004c0)=0x90) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000600)=ANY=[@ANYBLOB="046c163000000000060000000000000005000000000000000400000000000000ffffffff000000007fffffffffffffff0900000000000000000000000000000000000000000000008000000000000000000000000000000002000000000000000100c576e6fe2e086eb7000000000000000000000000000000000000000000000400000000000000000000000000000009000000000000000100ffffffffffff08000000000000000000000000000000000000000000000081150000000000000000000000000000080000000000000076e5411a00000000025c0000000000000000000000000000000000000000000000020000000000000000000000000000"]) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0xc0200, 0x0) sched_setscheduler(0x0, 0x6, &(0x7f0000000100)=0x8b89d10) r6 = socket(0x1e, 0x805, 0x0) r7 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r7, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000300)={0x2, &(0x7f0000000180)=[{}, {}]}) r8 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r8, 0x10f, 0x87, &(0x7f0000000280)=@req3={0x80000000, 0x1}, 0x1c) setsockopt$packet_tx_ring(r6, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2, 0x3ff}, 0x94) [ 753.360927] hfs: unable to parse mount options [ 753.442839] hfs: unable to parse mount options 12:06:07 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000919000/0x400000)=nil, 0x400000, 0xffffffffffffffff, 0x8031, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vga_arbiter\x00', 0x50200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0xcbfc6160cbaf4ab3, 0xfa00, {0x4, &(0x7f0000000440), 0x10d, 0xa}}, 0xfffffc38) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f00000001c0)) openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x2, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x480, 0x0) ioctl$VHOST_SET_FEATURES(r3, 0x4008af00, &(0x7f0000000500)=0xc00001d) setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, &(0x7f0000000200), 0x4) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e21, 0x0, @mcast1, 0x2}}, 0xffffffff, 0xf79}, &(0x7f00000004c0)=0x90) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000600)=ANY=[@ANYBLOB="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"]) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0xc0200, 0x0) sched_setscheduler(0x0, 0x6, &(0x7f0000000100)=0x8b89d10) r6 = socket(0x1e, 0x805, 0x0) r7 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r7, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000300)={0x2, &(0x7f0000000180)=[{}, {}]}) r8 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r8, 0x10f, 0x87, &(0x7f0000000280)=@req3={0x80000000, 0x1}, 0x1c) setsockopt$packet_tx_ring(r6, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2, 0x3ff}, 0x94) [ 753.622022] hfs: unable to load codepage "none" [ 753.626987] hfs: unable to parse mount options 12:06:07 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x100, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000480)={0x79, 0x0, [0x404]}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000001940)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfe2f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f0000000100)) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet6(0xa, 0x0, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'veth0\x00', 0x8}) 12:06:07 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepaMe', 0x3d, 'none'}}]}) 12:06:07 executing program 4: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x80, 0x400000) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000100)={0xb80000, 0x7, 0x30000, [], &(0x7f00000000c0)={0xbf0beb, 0x8cd, [], @p_u32=&(0x7f0000000040)=0x9}}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000014c0)="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", 0x1000) r3 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYRES64], 0xfffffd34) recvmsg(r3, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 753.771848] hfs: unable to parse mount options [ 753.798041] hfs: unable to load codepage "none" [ 753.802758] hfs: unable to parse mount options [ 753.880685] hfs: unable to parse mount options 12:06:07 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x60000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:08 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepaNe', 0x3d, 'none'}}]}) [ 754.259865] hfs: unable to parse mount options [ 754.349544] hfs: unable to load codepage "none" [ 754.355103] hfs: unable to parse mount options [ 754.414306] hfs: unable to parse mount options 12:06:08 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x68000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:08 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepaOe', 0x3d, 'none'}}]}) 12:06:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) socket$kcm(0x2b, 0x80000200000005, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x567, 0x100) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x2) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYRES64], 0xfffffd34) recvmsg(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 754.805912] hfs: unable to load codepage "none" [ 754.810719] hfs: unable to parse mount options [ 754.828359] hfs: unable to parse mount options [ 754.891776] hfs: unable to parse mount options 12:06:08 executing program 2: openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000480)={0x79, 0x0, [0x404]}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000001940)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfe2f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f0000000100)) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet6(0xa, 0x0, 0x0) 12:06:08 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 755.216765] hfs: unable to load codepage "none" [ 755.235255] hfs: unable to parse mount options [ 755.958403] kvm: vcpu 0: requested 34784 ns lapic timer period limited to 200000 ns 12:06:10 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000919000/0x400000)=nil, 0x400000, 0xffffffffffffffff, 0x8031, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vga_arbiter\x00', 0x50200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0xcbfc6160cbaf4ab3, 0xfa00, {0x4, &(0x7f0000000440), 0x10d, 0xa}}, 0xfffffc38) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f00000001c0)) openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x2, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x480, 0x0) ioctl$VHOST_SET_FEATURES(r3, 0x4008af00, &(0x7f0000000500)=0xc00001d) setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, &(0x7f0000000200), 0x4) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e21, 0x0, @mcast1, 0x2}}, 0xffffffff, 0xf79}, &(0x7f00000004c0)=0x90) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000600)=ANY=[@ANYBLOB="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"]) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0xc0200, 0x0) sched_setscheduler(0x0, 0x6, &(0x7f0000000100)=0x8b89d10) r6 = socket(0x1e, 0x805, 0x0) r7 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r7, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000300)={0x2, &(0x7f0000000180)=[{}, {}]}) r8 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r8, 0x10f, 0x87, &(0x7f0000000280)=@req3={0x80000000, 0x1}, 0x1c) setsockopt$packet_tx_ring(r6, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2, 0x3ff}, 0x94) 12:06:10 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepaRe', 0x3d, 'none'}}]}) 12:06:10 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x74000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = accept$alg(r0, 0x0, 0x0) syz_open_pts(0xffffffffffffff9c, 0x100) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000000)) write$binfmt_script(r2, &(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYRES64], 0xfffffd34) recvmsg(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 12:06:10 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000480)={0x79, 0x0, [0x404]}) ioctl$RTC_PIE_ON(r0, 0x7005) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f00000001c0)={0x1, 0x1000, 0xffff, 0x401, 0xc, 0x0, 0xfff, 0x0, 0x100000001, 0xee, 0x200, 0x7}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) timerfd_gettime(r0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x28001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000340)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000380)={'team0\x00', r5}) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000001940)={"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"}) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xffffffffffffffbc, 0xfffffffffffffffc, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r6 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) fcntl$F_GET_RW_HINT(r6, 0x40b, &(0x7f0000000100)) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") rt_sigtimedwait(&(0x7f0000000000)={0xcaa1}, &(0x7f0000000040), &(0x7f0000000180), 0x8) socket$inet6(0xa, 0x0, 0x0) 12:06:10 executing program 3 (fault-call:2 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 756.720049] hfs: unable to parse mount options [ 756.786475] hfs: unable to parse mount options 12:06:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 756.818430] hfs: unable to load codepage "none" [ 756.823477] hfs: unable to parse mount options 12:06:10 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepaSe', 0x3d, 'none'}}]}) 12:06:10 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x3, 0x0, 0x0) [ 757.124023] hfs: unable to parse mount options [ 757.257079] hfs: unable to load codepage "none" [ 757.262135] hfs: unable to parse mount options 12:06:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x0) 12:06:11 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepaUe', 0x3d, 'none'}}]}) [ 757.589268] hfs: unable to parse mount options [ 757.670805] hfs: unable to parse mount options 12:06:12 executing program 1: mmap(&(0x7f0000011000/0x2000)=nil, 0x2000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r2 = userfaultfd(0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000200)=0x3, 0x4) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000001c0)={{&(0x7f0000010000/0x4000)=nil, 0x4000}, 0xfffffffffffffffa}) write$sndseq(r0, &(0x7f0000000180), 0x0) write$sndseq(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr}], 0x30) read(r0, &(0x7f0000000000)=""/126, 0xfffffeab) r3 = gettid() openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video36\x00', 0x2, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{}, {0x0, 0x1c9c380}}, 0x0) tkill(r3, 0x1000000000016) dup2(r0, r2) 12:06:12 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x2) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) socket$kcm(0x2b, 0x1, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYRES64], 0xfffffd34) recvmsg(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 12:06:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x300, 0x0, 0x0) 12:06:12 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000480)={0x79, 0x0, [0x404]}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000001940)={"a523fb9656eb871ffcd7ffeb51d84e738a55eba841ae487e33cdd921e8a51ce6c924020f0ac3562dd8cdeb31deac16f46da4ac16ee8165bce439eddce671c5b0a1103ea3f86a43cbb78504f6f9c77c2f09dc27632ec6036ee52a87e321e707c0cfe15576c26d52d0334c8d4693e127b3a046a5ed7796c9c5017cfd58ec871ed76369846fea9ebfa2f7f96496abf4ef57ed1ecd930eb9e13396875f01e932804ffe8a34c8fbedd97cdfb3176ec59fbbfd20a6ff17795431c341a35eb0f5f703480a5211cc6a7e2084e4a9b6aedf60b7b8084b00ca2cbed255b4cc4679c967432fea5e95119f9635e94794aab6ef54f290677fa08d0ee2cc8eae468efd02417055d3f3ccc86b629dfb878c4d115c16c75fe352cffa93648cf49577256b5d2faf0634335c97ffff966ae90cbf81250df3613c25d2789c869c9cc95a6e9d364c4c684059c593f9950e66cf81cd9f36d73fade4f0cbb795010364d13ff32c12efd91d0ebb6533700945f2db6113a630bd521eec89a74c46e1733b72d6e4d2ccee3b40f99809a9a4fb5fc2d1c53e1366d455bcbe81893100ab56b2556b55c1a0c5787356b464c3bf7011488e55f587a6d4420d46d69a74ee5bbfbcb0d6cb00aae8c3dfd6dd2e9f76d7a542f20553207b668dce69f1b463ee9166e81bb109f461b8885f15c9e525d72260ccdbd69e3345612158114780b9409ea856cb724faa6ed27ba836b35c10e7c7d43f2fa34f98f16a00f31565e16a213eaf4a7f438c89733ebe6d16328b930fd942bc64d631dd1f2aa1cc2ccdaff2324076c83e1ba4d2a0e40e010c96b42e7a4a76cd7a89ef592b9b3030f62d9fbd565ee5908ab90b42620b61e5d1e08621a31d21003cd12a450461636472fa64a7e1b98778bfb482fb4b4da31b42ee98b10f9c0f4c085d08c37ee2e3a9e4a5aff72a0ab844fcbfa224842c85f6cdfd25829c44760e3859624f891df4824f7d17938ac2dee1412cf3083e1d5ee2d29b63267ccba535409da7bef05d3fa79a3ef037ee609e01ad345ee17f48b5e8510f767de35df4dfb856f7533ad88866c6b01fe345107ba7191a8809e2e014492acf9c4f35cad664198a65c55f884490f4b30b4526324be842c393f336f16bea2bf6c6b917fdb751e12ff689ab4ffa44625a8b2bc1de4e88682abe5ce9d1942792747681ad23c31046d825140987f19a9cf10323c3f50a20f35a6d1dd8ca6758296b4537a0da1a853011b777623c8774b3689897cf9264a7782470847f36a8093f04000000663438ab39d8a777fb3e10cb4a2402a939a98d387087c5ca5fd8fbc4d96ae698b5bb84a0a8484e2b85743e623a033eb5b1889ccfb4b95885bc69d4c1cb819b95e7923e557c9ec9ec10e94d1e1295fc2f256fa095036f6cfc04c414fc57fc72c120614a586089c93741e97a61c46600"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfe2f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) accept$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000040)=0x1c) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f0000000100)) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet6(0xa, 0x0, 0x0) 12:06:12 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepaVe', 0x3d, 'none'}}]}) [ 758.647694] hfs: unable to parse mount options 12:06:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x50) [ 758.714971] hfs: unable to load codepage "none" [ 758.722391] hfs: unable to parse mount options 12:06:12 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x97ffffff, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:12 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000240)=0x1000, 0x4) sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x294, r1, 0x300, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xa7}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6e5}]}, @TIPC_NLA_BEARER={0x2c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffffb9}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x11}]}]}, @TIPC_NLA_BEARER={0xe0, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @remote}}, {0x14, 0x2, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfff}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xff}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e20, @remote}}}}]}, @TIPC_NLA_LINK={0x58, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xed49}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}]}, @TIPC_NLA_MEDIA={0xd4, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}]}]}]}, 0x294}, 0x1, 0x0, 0x0, 0x4040}, 0x804) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000140)={0x0, 0xffffffffffffff70, &(0x7f0000000100)={&(0x7f0000000280)={0x2c, r2, 0x15, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x2c}}, 0x0) syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000200)='./file0\x00', 0x39, 0x3, &(0x7f00000007c0)=[{&(0x7f0000000580)="2471591f75acd2b0a58921502ebd2245109f88d4b7831b4a4af6790e1d7629abe6aaa24a48c1b3fb69bd3e0cd1b5c6011735091c27d1d9b558870b44541d4e42dbc82c428f06e8ef2a5dfc4ff12919ed93b4eb3f6c99c142953d3b4ad8865ea17b2acdea2bd13f663c5134e6d5b3563aea1c10f7c26b776fd8269de7b62b0d67577c5969c51b060fc7b4cfb15f909ae083f3bb10992f", 0x96, 0xffffffff}, {&(0x7f0000000640)="31b0b2d9a512bfae3a465762eaf8cea2a86093142625d625b7f42bb62b7c379807680e20caed1ec34cd8342ee6c436c66dfdddd9b46ce4875d0ce9fda2194b9c3b2c88fd4e24a1259742867450bdfffd6a1c358b963419b95053d2607a94887a6526ab18d85fff9bb287fc6fa1281cbf18998a76b1b32b81d74d29bea98d43f27de45d9a618e392618", 0x89, 0xffff}, {&(0x7f0000000700)="a150af202a698fdfc76b3e8b59f50d195d35643a7778592e0437aa292a4eca8cc81d8d1dc788cf10974184cfa6be7c4655f704e21c92b15cde8457c930103b06c3c23ec17f5d6677de4d8c410f9a4588e05ddadb07de7a14b8805fdd21f92121ce6b603202030c479aa88608020faab5441b795df25feb64eb0d4df52b025fd713f185656a90267d228db7212b1f99cadcb7665e9a98bcfc7c65a447f504f558ce4c3580fa1556c63f", 0xa9, 0x5}], 0x1000000, &(0x7f0000000840)={[{@background_gc_on='background_gc=on'}, {@disable_roll_forward='disable_roll_forward'}, {@grpjquota={'grpjquota', 0x3d, 'broadcast-link\x00'}}, {@grpquota={'grpquota'}}, {@grpquota={'grpquota'}}], [{@seclabel='seclabel'}, {@smackfsroot={'smackfsroot', 0x3d, 'TIPCv2\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'em1selinux'}}]}) r3 = getegid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000900)={0x0, 0x0, 0x0}, &(0x7f0000000940)=0xc) r5 = getgid() stat(&(0x7f0000000980)='\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000a40), &(0x7f0000000a80), &(0x7f0000000ac0)=0x0) stat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000bc0)={0x0, 0x0, 0x0}, &(0x7f0000000c00)=0xc) stat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f0000000d00)=[0xee01]) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0, 0x0}, &(0x7f0000000d80)=0xc) getgroups(0xa, &(0x7f0000000dc0)=[r3, r4, r5, r6, r7, r8, r9, r10, r11, r12]) [ 758.756309] hfs: unable to parse mount options [ 758.765813] kvm: vcpu 0: requested 34784 ns lapic timer period limited to 200000 ns 12:06:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x2000) 12:06:12 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepaae', 0x3d, 'none'}}]}) 12:06:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0xffffffffffffff7f) recvmmsg(0xffffffffffffffff, &(0x7f0000005b40), 0x0, 0x40, &(0x7f0000005c00)={0x77359400}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000005c40)={0x0, 0x3, 0x20, 0x0, 0xc}, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000200)=ANY=[@ANYBLOB="d1a42e59f0b277a8c41f410711b27ac820bdb44f9255a1d26c3b45f714ba6d9b88e991dedfdcfb48425c1fd4ecb110ee8ff894c37025ce842c808fba883899a48f6d7e33e1db781e68f3129558a6bfbe969b22dd9c2a9021987ff7f90326ce22f3307373df2fa9f25dbe23229a2da9da023d777cf8de019050a9915f288c9c56c3"], 0x1) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, 0x0) r1 = memfd_create(&(0x7f0000000140)='^\x00', 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x2) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r1, &(0x7f00000ddff8)=0x3, 0x102002700) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x1011c0, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f00000003c0)={'mangle\x00'}, 0x0) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x2, 0x0) ioctl$VIDIOC_G_STD(r2, 0x80085617, &(0x7f0000000000)) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) writev(0xffffffffffffffff, &(0x7f0000000580), 0x0) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 759.017741] hfs: unable to parse mount options [ 759.028258] hfs: unable to load codepage "none" [ 759.033266] hfs: unable to parse mount options 12:06:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x5000) 12:06:13 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = open(&(0x7f0000000040)='./file0\x00', 0x101002, 0x1) ioctl$VIDIOC_SUBDEV_S_CROP(r1, 0xc038563c, &(0x7f0000000140)={0x1, 0x0, {0x1ff, 0xfffffffffdfffff8, 0x8000, 0xfc}}) r2 = socket$kcm(0x2b, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYRES64], 0xfffffd34) recvmsg(r3, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000000)=0x1ff, 0x4) fcntl$lock(r3, 0x5, &(0x7f00000000c0)={0x4, 0x7, 0x4, 0x5}) 12:06:13 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepabe', 0x3d, 'none'}}]}) [ 759.515526] hfs: unable to parse mount options [ 759.527795] hfs: unable to load codepage "none" [ 759.549963] hfs: unable to parse mount options [ 759.614014] hfs: unable to parse mount options 12:06:13 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000480)={0x79, 0x0, [0x404]}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x4000000) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0)=0x3, 0x4) timerfd_gettime(0xffffffffffffffff, 0x0) signalfd4(r0, &(0x7f0000000240)={0x8}, 0x8, 0x80800) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="c4000000", @ANYRES16=r4, @ANYBLOB="04002dbd7000fcdbdf250c0000006c000100100800000064703a73797a3100000000100001981e623a76657468310000000024000200080002000000000006000400070000000800020000080000080003000000000024000200080004000a000000080001000b000000080004000100008008000300fbffffff2300090008000100030000000800020000000000080002001f000000080002000700000014000200080001000200000008000200010000000c00020008000200000364b1c52857f1b0d8ea40d3fa8d23e48980179249e128dc62be4c7aac0a9e5cec00f6e1c65d4281af462e3e814ed9f009c7000000000000"], 0xc4}}, 0x4000) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000001940)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfe2f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) fcntl$F_GET_RW_HINT(r6, 0x40b, &(0x7f0000000100)) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@mcast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@mcast1}}, &(0x7f00000006c0)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000002140)={'ip_vti0\x00', 0x0}) getpeername$packet(r6, &(0x7f00000029c0)={0x11, 0x0, 0x0}, &(0x7f0000002a00)=0x14) sendmmsg(r6, &(0x7f0000004140)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000400)}, {&(0x7f0000000500)="c74b1f1e55d676930eb8aecce1b2204e01c166fa6674f69da0b8277f4b703a19874eaafcc24f2cdab65cbdd475f99ad69b67f0354302ad63b5e4d161a783edd145101c35d5c0", 0x46}], 0x2, &(0x7f0000000580)}, 0x40}, {{&(0x7f0000000700)=@hci={0x1f, r7, 0x3}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000000780)="fef45aca89d5f89556d99af0908ee76ef0b6f7378afd2dcfee0193078735845cb2a1c6a2a53deb03ac5e69967b2b16f668cdcf6fd9d383c96cecfce7bac5fc44155e8bb269fa74544760a8c4d1dba8865287be53c929efd943eb51259c5a0c90e1e3207fa2e242a58ca0de1d1e1271dc1fb2186829b567a47e8e945d330ccd146487a315c2c4e323be6d1728439a8aa20cf62ad3aa6f893c272e051ff1c927aab2ebbdb3d5e8907b9bb26dfcd688cd73e892e5eec520fd0dd1c8eaec71237920640a9f3aaa883a4aaf991547e1d6d1d907abcdd7769ff22fd7e01554100ac7cc1d19eed6ca5337c69b03063b1ff5cdd673fd20d02f210e3ace4e16b240b482845e6d8e88b28c604fc3c19cb344d3c08eb5c6e7150c9c4fa7faaa027196b2b8f6cc67c7101de2d360b1da56e6801d8c249e71063d9e2309065eb9b35c300984e3ad5563941578764a311b3d00bf0cb25c677f995f4327c2f2ccc04d3ec90944bb236d61b68b3ad9883f0f3a1ed4642f0209e2d49ef67f9dc0d7bfc0a7790dd0f864a13c5288dad3835e1c29911379c7ecf0240bfd1a86001c332abe8df957522bca86147bfaf91e7221db1b8ebe310f06147912abc8d1396909d1929a0dddf7a31d738f893638570e99d56b68657a0d0b1acf00430a38acab747cbbbd4328a3bc4e16f1942396bd48064d73240dbed7a97e3d68f097304d9d3a91a0a6f446741946ad16a71fda1ed189fa29cd0efd88f87ef84429f0a2c1a4517124529815356811a3972d2628d224681bec2f41e42b6d33dd0ac35532a5ec2619ffbe917107092cdc574624fd8f98cf964d5d40587cf27b544191b2e28bf1b8a6ddc3e65db8b151c24a22353bbd18cc67b0deccb07734721aa5ebb3b809c78ad217c15359c0e2a3d0857adbe2824a1f40563bd3900438c5331015250ca3406f5b04e35610bedd4a7cd675f78edb477ddbee8f69a1dda5b288dadea4ead3625e7301b8e9cac1f1e934f9b48e0a77c509e7efb1ad7fba165535dbb83f9edcd69d2e329f74338e7292bde5c308ee5c6b188ba4fe58cdcbafb378e99c04acd3e4770b6d65ed346889943cf13dd928ace950a88e762fc2ba5cab2b9cdcc81de8ef9974e79bf0871dec021e33eeb12aec703d67b8062869ee3c13df7a0ecd1957aa057d6ffd3a09b1498622b4d4178cf841ef2d551fb35e487a074dad866732375de7e5488d11c3dddb6009ddf41d12324fb2545a2196a7eb6d7739d856bf84e2b8c2ced9469085a6449c3a2ac2ce8719baa2e0b997dfdf7d5e53a90d249ee4e8e103d39d86455773b18e28c8268e9b56d55bad5bc4f0096d265de4db199cb980a708cb1ab798ad5d0113133e65187d7213729891d61c18cdcbd3bed3f0342bca4e85c98f68bf7d771eb89288649312223bf3c6bf46183c1f7f969dbbff49080b8f95d7199d55aaf99536c8f4e495231ff5c0929a2b96fc3b7d03a6e7b90f1292b5bbe2429c542665d7d03ab5d2141f2b81c504dc4c15fe9238bb03623e265dd561ecf825fc2ecb253c5305749ea48a625df879a27cbb11b23087ef124c05642a33d28fd44a6628778e271df4cc608603c15711b2568b99bb5cd3a432cd97dfb684c0d7a7f237cc0ffd100f66ff7e92a94ad3affe1b2bbcf3d922a7fe80f474733fd4a29f4a09e6e9aa3baaf031212d7db7775030dedfc249ee06cfba7a091a8d0e7b39704121a8babee8a807105459d14c0fb9a9e76710e2cf1bb8fff21e2144fce68a59e52fdcfa709b5939aed2b776ea8fdb0563f8c3b63c52c9a8ad7036539196f8aa1656d61a6afb6c12b28d2450886b8366823f3350ac1d10a698ce69867d68c24a84f658ed24b2fc5b76c387d79b9daa94f01b0e3dbb0dacf3f571f1f6c8b0f7a4507fa47124f6a0c66a2c82c9eeed91f67dc9fa7bd9b53da1794a786fd96965de8fb1249b466c792ceb74b24e7adb6106030c208423bac4f9bce949769c353eada3dea886bd7a0792e3f7834ff3eb79ddcf5b250923dd8b1e3418d63caec843ac3924dd067afbd67b150dedb5636c29c152a95160f0f7e8315764598b659dbfdd41a1bc9da9f7e3c3d78c3b694063d55b07e80d1632f7c1fec7953712941be9ff3a6c0d547f0a467ace7937dbe6dd9f2138c5ac3b4d1aa97dd893ba9879bd2c614bba6c7544651aef3649c70cae3ff1bc9b1fc3fc774fd786af6b0dcc5953853aff309c3463c05c76be16417cf915fa98679cc323c1e385ed90a28ed55c652c12536e922df54e95118607932cea8f703ebc8c9f2308c2b19f0f7337115ec5062e4b28c28fb2a1a921369d6a6d306c0391758ceca19eed54323cfe0667095d1efd5a2972f8545e70960edc14ca3ba1118bc2a270e141c1dd45b940cde53ceb10750c9b81615c285229c2bf7b3334276abf674ad60d8e690e22817a372187f24074277b21e0880eecb492de671ae3774f1669db5c19714e29b05ab642bf29170ac792d3f80b26415ec07d593e82e5431a042bf760e7772608c66f42ec76b0887cea2b1fae5677f70ada9f0610720fc9ed0b400e045b7b141f94f850d6d587e7af33de43da82e52057e8da093d5adb12fd6ca210126b4f1bbf4e95e05b3e62836ee0c7449734be1a1d34bf47187865386b8f0b1724cf7fbef64282bd5b25c3e23a879493a7091f75d5632c34c3bf7ce12c896d7f786eacc24742f09f23e7d6f2b78787cd7a10549b49caf6c3d6a204b3f20f1969662d0601516507ffd3dd7b3346620b671495d7e28747723b09bcd2cde28e3f06165a1799c9cb743b2e549c9906fa708ce61c790796fa9734c8b2fce9f9438048ff449b4c08a89edb5404502124f3f412621a9479e00ca8de0636aba3f5da23b7dc1be8b25f92d95395ed4a28ef532808fedae34ea21ed45df74fe3da4acf937d7f9e4e6028623ff891760fcfa72facfdabae525ed8f72133ba16395d42b71ceb5a0c7aa71f1e7d121bd175c41138d9af65917696968dc7cdbc421c02a5a7a57480e44f6798f5c77adf91369299b74a788c69349aad2d8c49c90964b59fd5a758901f59f7fb84cf3a001c13021c2cb90ab3db2f09390658321c1cfdd18b1e244bf03bf4d988d96c8599320831c6457dac965c7c9b12d86d9b2cbd6cec7103efaa8b1c58898297bba94d6881d9fb2eb60295c8fbc0bb0068dea85fc0a02a7b865c2d850acd39d2f89d9cd2101be7546df24154a20be31685b2a590a662ade79565f3a3dc71bf994d75c44221bb190275a41939433adc22515487c915b5e8579efe158c43f27123980c7e7f42234e724ab55d08ac3a15ba41a61374ed5fe5100b09171dfc7c0f33ae63f3e42e4325d58b14f6804ed8679c78bc9400158fc93d303997dcb77e5d06d0b4436ccb98ecd1c653cbf7dc594237fbd7ecef5b239ddac54ed3077e532fa57e621e51f114e87d1981da753fb0dfd68d0d94dc2e116fbe3ccb7603f7ee57cfe7b4707ea06bb15262bb80af56110d482084fefe6b73c1d25da27b161a73de9496c8c0efa0a673069696b4ab922decafcc7e69ca4aae6269ad2e71428b4303aca08cc67e527728b248006d822053973095ce40a185022a00bdd4204755f470eb16588f21c4edc4b84ea9facb8664b931d55731970f034958088cfe30d30c06505d80a824631baf59e3841b8f93d9ec085861be7b683c66cfbb4af9f855b4e3b39596ab63961152d9236d24ab96dd89b712b4999e87241e488c672fdf32ae6b41f00da9df2905e3f1452e147a2a599c3163c70327471568804e46f2195705bc81308c4efcbe02534ad871fd2666564a50d9387957af33cc0568738d541c5ece5de8a8df0aa14049486ea15dec998e7c1e9ca3f68c80451356c7e2a0cf16ef06d4c200153490052b0b4ae90cafb0c7a06add5fd125a43f7c1a5e26b50da28db2bce9cd9b7dcc66da1c73600aa04bc5495bdebca9c34fdd964dfe393c625ba92d03b52e0148d24b48a7ac54309de367cdde864316fc0d36f0b462dac6525409fc74db23c0b3700b31005a9e55faf18f0d6f2f06e069c58d9736b61109265ccdace5a6f434cf964f90d4c1fc9e9c0439cb68663b2652c543f8e73e1611001d5677d72dd6f7bb5aa02693eda6a173190ed0bd9578d7bf94115d81f05bba576c9b7d353de147464a9588b335ab4f9e546cc0fd2843013b5ba4135e53ef8ffaa27689f8b4cd1ca89bd40857195ff4dc2d84fb47197ca9f49a6a7e7982057e146af6944dd2e010c1256d17d9aa93da7d29592601acafef70582edff15a1df18a03df6d1ecdfcb1c2398dbc969c399cf5bd81643fc97ea9ca8e3c2516e8e963028ea394300f4e3b492f0130f9087ee8927369f24d88b32d6dbb931ea54a286a4a10c1fb63a64732b6a3813c874b1685588041b8c8f345ed0a61d375de2fcbe1e13df43badfbf68532e1ed40e03624932a79f4fd41b4e695b9d1c0504ea8e244f3917424e2c1f65deb4089fb479139e19764d6874d2f5f6d06bfa4f92f20ecd77480205f2e3e3e9c3bdb446a40050bea4e3159a4d597fb5caf82b16443fd2fa4a45337205694d4a6974cad7d36cb779b26d82c2d9cad4e6ba4ccb91d95bf493e278a99c6ec55c35cd2fa7d5cc4a89680a86e0728f714d60757d78eed65209cad3283e6da578efaabad73ab78b862574358e04d2f4757475460f60592250a2a8eb9538cde4ce8a9894b0bd88494b845d6fd900bc131d406dbbb8f4257f7dca94eff81793eb44d9de8be72e79f688e56d71b12b02cd9c3786cd7f5209c9bae012427e632fda2958fc3ba713cf0e93f396b2da787501969a5b9d50f773a3e1a7386efd4a6f8b270b62e68051a68fca3d87f275b5f53ab25d7f26b21303e5e21588c36a0604b6370ef13de12f0a453ce76e6c8048d8f8f351ea861c9727a21520f31471bdd3e4acacbcbf3ff1385263f9ccca8dd1f9f8692bb276bda4595bc4ddc78b97c4f035b72a409c645f34d0a3b60bc58365b565c642c82f0e457fe4c1f63eeec44ec3d65d95b1d51ec5f4123116f3a019e44e4039a8f3606518709cca8f252e6ce6a46e41474eff035ff5cac85fe06bc3e4fd3f8c9929e23b68952079a365a40f424589411e4c70028a61c018bb6277859a87beb643d0e40ec51d8f98680e0dbfa7fcffad6743ba665b2b638d44af6e1a94a72c7203f5a51f69753d8d3a33cfad03cb86068a4efe9d6407043bd0205f959c6f480669d23eafc23bfb2250e228fe957c2f9f2588e96ed5eb78975a6b00d7759293ea85df975b287cfd31eaf5724bd3f3a8b85ba508a4f0953b145e53aab3b181ff33060859cb34f622d09848f5e1d0201617cf0a667f5d68c27f62f74dd8f039d32bae0aac96a3e226ef713d53c789689949b01685d354f9804570ab11f46e8c1d461360ba00351a23e52b5148e38be9b78d7412782b4cfbed54444182a12fc07f3328018bca952941bf5c3269055043b28bb256598a1124efb9e1adfc8481c1c6d6b183b9e8e160c3d9d38e8aa5e34ff0ae60fea82eb650a3b51c9d8c1292ac726412ad531acf7d7c06262044a6d88975b71aa8b652a7b2b0b1da9a0cc06916d8c6643607f2c2e374cec0c028773977b421e4e5b95d19b8c4e08fd293440153086725f2f83b689f9658a99ce973f75fbbfcd6b176bb1a2700f0d8adcffab0d59a4303f9060018a486d24cbd50e5234cb8faa5ec98ab61b4c050689abebbd70ad26396f5bc8973435ad7f8265153eda660d22cdbfbdba0f91f0e4dddbd9ca0725bfb3436331d0b070ea148951ccfd85328ca02c290bb48978e2da1f5ef1ad", 0x1000}, {&(0x7f0000001780)="33fead02c7498c0cb2bcfd947a165779983c465daff75dd07cb21c5cebac619f553d1649f0a05e6d5e8d0723b4", 0x2d}], 0x2, &(0x7f0000001800)=[{0xc0, 0x100, 0x4, "d83987ef43379a9a1c163c0af531b22da3b0a62c6f0fdb9a311a0b3109a35cbf691f4299418061ed0fcd41ef7d82c54177ea95f15e267f712d4489264930c30314845b30ef82df7f2d8f48e7a99412cee9d824b40f1007fbad0595366cc2cdb0817a77e1b23d1cff27bd0e02047a43b24984ac3b636dc249202966a072cd05702ac42ed446b4322dcd49c5ae76cd7114281894427f6aa07fc70549264fbdaa542f90dd6e67190f6b1b437144"}], 0xc0}, 0x100}, {{0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f00000018c0)="03cdb33a2361b5d04e358de51c7863ec25c9dc5b16b681666a7d7bf4af39c11ed965a3d95470833b26998c981749125a4205b19cd16654e351ee94f27541fca1bd9a4c9988a5b6780fad4d0c765ae32cd5296e7aa00e8cd3c16772468abb0fdbc19fca0cc8cb75f645cdc2a23363415cb3edc45dc6259920e5", 0x79}, {&(0x7f0000001d40)="d46a3b8753a76f543d7821e0214032b10ecc9198acccd3a03286cefbecbee3902ff969ef6aaf7badf2e4e6dba7ab014f7b365131d0dfb28c0d2d2530b4cbe800790eaec68a8de8", 0x47}], 0x2}, 0xb3f}, {{&(0x7f0000001e00)=@in6={0xa, 0x4e23, 0x36, @empty}, 0x80, &(0x7f0000002000)=[{&(0x7f0000001e80)="3d5d59aa7305dcffaf4bbbd21fb4484423c6d0526a27e77a8387f414b599f03b7c3cada572aac3eb0964cf3d82918681a55c87c1b1ab22c2b5b080f8a71cbd0a12563aeca1d672307aa1fdd70e02ef06a13cd867ff256be01900bfc02ec24b32bf2bb99c1834f44004ee6bfc0972", 0x6e}, {&(0x7f0000001f00)="dcaad23f02fa1055e0ddf7f283e9ab31b3154a8bb8ef0d88c3671399d47d32f3da48d9faadfb7ea2119dbcbb96a14b3c41e520a874bf789d9c980fb2abd6aee744f5b83304951a02d5caa3d94f33a63573ad26c7ca948505a7b970dfa412898c4dd7715e57d1834cdb10bb306aec8e4ff7652a80dafcbd94cc7d650cf35210d7e808e9652861014a34c59fc49bc3ce96cfe227492e080010d14bc4f64c93c047611269ba7a008a0544812895ed64c9bf9aa8828f86260e389189f98ff94b3ac02977111334f4e41470", 0xc9}], 0x2, &(0x7f0000002040)=[{0x100, 0x119, 0x0, "0b7b5ef6c61930e623a699ba5642553a36c3c84c94b9561f967eaa3f810e9087238a4549a3de6288345844be2fc3aef80db7298e5dbf42077557c2c64ba2ef1fd9323bf4ae73ea5428aca7c5844cd6c8732c9dbb841c10a4cc80725f220c073e8453ad6f22107af33ad1345b61a5157d13e93520b46923e65c35516b1216306a4471506bb26522f40ea7b938e2d6a55524d0b4823c559b57574ff00bd4a0b384701139d6e0ca8bd288c43e3994bb614f650320bbdd2dd473510a9916b5f7c00ecd1ed4f8259297af8d795f1221b21d73b08b7f3da9dc283a6b48b18e9f0cacd169b8d08f55ba1d1995a79a21903d4cb1"}], 0x100}, 0x100}, {{&(0x7f0000002180)=@can={0x1d, r8}, 0x80, &(0x7f0000002640)=[{&(0x7f0000002200)="0485f195e701ddfd79e666d014666889130e179ffae2941adfc4e1feb668f3afb85cddf4ab20e441e864fc1873726e65a5cf592ae2106b7dfcab6299499bf77d506a", 0x42}, {&(0x7f0000002280)="bd7422b1e0a4e871858dec213e4314db316e423a1ef36d4c8f55e51a6b7ee53f926ea9edc20608906e0d26864a216842ee9c1054a724f244f0d1e42e198be34d57b9878e329f28eab8d01e56950dcdf56d8215c7146de5e7ae5334ffecfd13d366b4dcbcb746c2cd1a4b11c3e497c2ae485839cd223aa026dcb538231a69fc5ee2bb65b48843b90fe5718ff9ad7a7301fa42496d10fad21bfb8dfbe07d198526ab5b38be875935cd4863e7", 0xab}, {&(0x7f0000002340)="09c979c4932f4445a6e4af604a7533a0ead2e54d5ccfcf56e50a87c1bd4848071a2bd466a6bc148ee9609a8d77c1a597112ef42ecfda083bf311eb5cd7c428611fff33219587bd95ca", 0x49}, {&(0x7f00000023c0)="5f71202e4ff0fc4151a1a2441def8bf131b41333be98651493b9308be46980151410ab838db8ba93f6769263b19d103e4ef3d2950d43ffd5761e4485cd54335e2d00b9851516b6d8f13900", 0x4b}, {&(0x7f0000002440)="91c69a575ab647686a675d540fa4ff4af7c00ea2aa437cf005e8764f9848c8468cc4d147e9221dc83c8a9a38f109b2d5e44bb55634340274136b4d4875dc7382fc820a5cf3ceec38b37d13bd03784e8eaf99f5ff0ae75054cb8514d1314f3366d65ddc60e49ed563547fce89c8216feac40872b5a3a7", 0x76}, {&(0x7f00000024c0)="117320a9a357c796cdd3fa01b2dd93ae0e87c81880e485173492270019966fe5f27f3b64afb07a9de73e13e1bf4f1a56dbcd2025705cf5f825fb5b2f2d3e21c4cd97f806571522d8bcadb397fcc70a8d84af951df351dd23cdf5b6a6", 0x5c}, {&(0x7f0000002540)="75638e791f009f4ad1092922284b7e704dd473ba57901a1a91c0f6aad0c7402d2840beda1a5df840c29803fc59e468268234d49c9b9a98846d0f1705c95e6204dc8d193ef8f71684d7e4e14de6be1fae5e472395430695589c71de3cc6cf61b036e5785d3ffa9921e20bd1ff779d76f11124bff46c67216353e1b024e8d71c43f13b0c455d2c63075fcef08b0dd7dcbed7e14d283f1636e2ba0a5cc85df8713c18303b86d08aee8a35d6cc564d6555898896de965b49ca337ccef0ee64fd10", 0xbf}, {&(0x7f0000002600)="c30f0bd290caf6a62d40a1731b90b12e5f903536", 0x14}], 0x8, &(0x7f00000026c0)=[{0x90, 0x113, 0x0, "5a3ea558dfabcea438f7b8e657fddb3eac3bc5822332e05482cfad57ea547eeb03fed99ee0153ebec0d4ef261b1fa30808603ad848cacfba3979739e1caf7bf64aa2057769841e0bf0c6744fbdc77b70e5ed508b2109242ba9d46567d3d577e1b98923759fc32b3887f6c819704649c9dd60979aecf48dd173"}, {0xb8, 0x113, 0x0, "a696ea65b1d2d3126185ac03bde20c4ecc7f0f0b8a858db42cc9025dc04355deb22aed390bdb2f3f86ab4f8f1cea5c765bc86d719acf8ac8e1a64d31e670085dc2a68b5245ea7bc0adc6b2692d8f8360d2d5eb2c008b50da69f4d5de5372cecbc7b6872be4bc5035c33d62d1c7885a614064eca53727f1c8e716c50091df699da109e3f9ad5a02ca3a7a45186275e84503aecb954f76e66854c95a77a77e9573d292561d"}], 0x148}, 0x800}, {{&(0x7f0000002840)=@in6={0xa, 0x4e22, 0x3fc000, @mcast2, 0x100000000}, 0x80, &(0x7f00000028c0), 0x0, &(0x7f0000002900)=[{0xb0, 0x107, 0x3, "2b72c4b34c4a118a42e6b6cdd28607c60d39d5a121f2b362ea1669f36a3396acf16b566ad552476b2ba7ea664a692832a0c40e1dd84fe4c5aeb50f1546120f36668d95357813013ba143871d1adb4d1065830c656eeeb336609e9ff95adbda4cc241f202693e341c13c48d881301e14e3fa9bb5759ee382729cae274ec0661fa3484c819144c2bf6923f10a82829a442dea6eaa49d0241eb8db4"}], 0xb0}, 0x8}, {{&(0x7f0000002a40)=@can={0x1d, r9}, 0x80, &(0x7f0000003b80)=[{&(0x7f0000002ac0)="66ac56a5cc3fe26bb6cbe9ec63727bda7a22e2b4cb6ff0eaa7f0d2f049c9efa182448131a2f165917eefbe3f909a80bb3b72a88973e5e1e940368dbb1d658997ebd28a137503ca5ee8c0b52f2bf8987ad64169ec4303f7e140c1f47a0e4b89e93f192923f09f0a4c3e9554f6690c358d06aa142aaa416d874b4bf26eaba3007a6b93c85652c283e15d300560e818869feaaba1263f8750f869bef702082bd8326fa7370e43531a0a361581b2", 0xac}, {&(0x7f0000002b80)="eb866d2b8960064e8c5a0e576574987c3a34378ccbd1c77a7be77fda6991acf8e599359aec27aeb1a396fcf3b576f62452e9317031512f0aeeeb740ea19a465b0ce1728643fb5f3e778e66928b69472a2d80ee473dd7e557edfa495e4805d8f2e3ffab96d265790595d5e35b6c4c364866077bad328f3564c6c9fb63a0bc108076cc6601d166662fc763467719a0d0fe6c6173999a525bfba7e9d116f758bf6e6d90982d8cddb07e0f774a359e752fa6640f26b74f5498cc5159e7408aede1dddf0673ab5b396d5beaffab9524807e1b67941c02685a642313ded09eabf1a9c616d71722d2aa2211ef1e321d58a08243f9649df8ec38caca37af37917e09ce39110811c829c1a63e31732980b44990f0bc42f0427dd1cb32f676c058c08da63941485110dcb096752f8bfcc6ed78c712857acfaeadee624ff52ab317cf02875ca75e4ea05fe48890a98ee4ceea7be6089dffe3dcc57817730305167a936db787d4e9d7483575fe0e21cf6e3664a9ff0d76ab18c0e3fe5c0c44a67d0b84108f14ee51ab18b0737bc2189115b6f6d1dbb8e722e022da658e65796f9239637b60df53e514839d4af2245f9429792b43b06cd419e73df9ccc01c34db60379911f1092186f1db83bf458373422bd78954dc82602387a44e4d9effdad9bdeb25bf003a56d93da6764e3b4d634a6c8bbc107b41b1e9612a98d67581f9afd362495139fd1a3acd8a3bef30ac0af9a3b1a0c993b7782b3234b8c9ccf37dc6c820e9c17e1ef766561aecbf3e527d41692f03648d21a4d411a8629f3377d360915daf05fe66fc301bf5ed353f5bb9b422b61ffbdbbacb4f965de4b3ff92c6be0f96b2e9cbd28f0b2a6d3ccbc6a4cd115c7bee2ce9f1bb0c76a319fdef7af5a1aad7c710a1e4a6ac4605e791afffa2419933827a34e1fe20c2dd6adf7e6aad8d9fb6513d2de79959a8231d3aa405f3e0021da3aba68e5f412c525a82a1df1ea8f3717e0435936b80b0b9a273d155f11737cd84d05957109c34246ab8240c4d6fa5cb949ad4534fc625590bb47d66632051d78bf6be6d9bca72d7f9d14ae236356064e47b7fe8d14916ee07485485f944e572d778f89d0c40f21dded4bb8205f13a2e9e82a673bdecd78e6e2624b6f2285ceda068dce5b31469bf7551e252314ddf1521ad2aa4f8bbf7e35285b02295057eeafd3249f7cb9a28082eb8ff760af046a0c0ed34edc3dd17c01e8af13106ef3fc4e043d987147f4ea83e08fdbc1b8e691c0995652a3a0d1c5253af731f06f26798508f23265e765bf3f34ae1a52a5658693609d6dc404dc121c2f26f27f8925b8a313846cbe77d366e9b35ada70a095a968a5a327a77378a62c75991c2af8cde581b7d11ac3e834093b7fe7f16fb6f23bbdd13e448a9bcb5e597e57b3d9e62259c9d6f52bb752fe8ffbf9919f7d5f559b552ecd61152b04d0f22ebf5a9775faf8ca794e75401b88710bac76488615a7b7e84c8811924fe1b76dc24572fc430c9c4837b050797459025dc0c26ff90b01482ada1a233bff0bbdf0db09e469d9ed89b269ceedc8d59e58fb9c806aad16967c73b372f6332982464f75e640a6faea2e76a54a4ad18f511d089eb7d6ef7cf0f28855e61d1ee6b9a3a687d5b7bfd85bd6d8196b709ff4cb57ff28626467f974f179d4ef51f577a6c492932a59a5a4c0d776411c4a22bd6aaa6d4c18536e608290d73fd0ad5d612eb733962da7bb9668548c2744cee87eddaa35fb7d486635964a669bc62b8598488282567fe225795a2a63612f5e2696b9a1fc4165029ca3e1877dacb57ec151e530639639e0dd7d713fc60f87a35537f02a892c3ca13516ad12d90dd2752d4b27229838c1d56a09827ff4edd2092b55922862f0131a49e6afc5d5e57cf54cdbc9f9cda59728a1fe1879f786b0e3efd31c8b4b15793d57cfd02bd17a585bf25a447edd80e4d00eeb7dc3f3f33d53ba424b50338b3e069fbaadc416911c76199ef847ff7aea2709754bcb091614414e5572a0f8c4acf8cc8dd9ade1aab3bafc5f72f0704a3a8bc4bfe814d49e746c1b980829a0128a9af8ba0edcd6498fe877f4396c930c5f28c2525cc09504d851f5424ba297b371ef50a22838ede289f87fba3402d52d3d6db79cbf1b5358ce3c02eb4787c72070d2878afffd8af0def35302a8c5c12343d48bb26c84aaf20973e694c8cef3ce70ba916316e9d579373f16cdde2ca02238679a030c3ecaba28966d615452a2803a219c5c45305133326c94f6b3eb96caa3ecf06c4069accb0134484b6bb5e35f450487f7897da8c4f7d61ef4b41ea9fa6010a352b89a951fefa8778adb402b53c96ae5a6a366007c04cfa39c09b92288fe2a49ac56e60bc6e185ea72a15608c1ead3320abd66a5134940404a03737bf2a916c2aa178c17b0988c809ab87e9d00b4d7a26b2c5bd84794b7959dee57af86532195e2d8757210845177d91141fb4ae34ea5b354e5268b21e738bef5f22a7d6b21c7bc790042595319fd3b02232b478195672c9e28f042bab3a3b9bfea1af17a26775852763ea73af1a0bdad0611e986a2451e4333b48baf56d5055bfc6511663c40f9b7a3012a481fadf47804181d7aae9d305d62ca90d5ae2eb5f3d6b912725faaf686a8a1808168f35e98a03cfbcd3090d1f3be166249d2962d7bdf5c2d40128209275f7d20684d1e1f2f3d4ae6aba537506591a877851ce39ead7378ed39236468169853e285302535c46ca945934800f9723ccb88bc2e61a46c6efbaffa8cc14a84b4fd660729236cd54e88f53000d6a2d5e906600c9ae6c51995ff71d0b3c3202f104f05ab5ef9e0fe11e2dd9cf2ec33b6ef068e86ade0701110bce571fcb3f18e5e0b3acc603cbb5feeb6d76637bf915a6abb06045f79603b827d55c356554f4162c764aec65bbbe35ffca58c72d0762538bfbe9fb2f5ea2a301271125904a1eed8489cdda4a920b7e3bfd700c6de7932a5959b12b7c9e2074d31558b223b5c5ba0cb88cce889763dbaf739e4f9eaaae401a97073e46bac1469d370d058e2fd669ea01fd620775eec7f9ddcd7d175a8e30cc8b46f8f1afc3bcf6f834e45b8438f305bc10df28e37f14ff3b30ec58fa9a877db864f1a26d9215b274d2293a451532ef7dcbd0479cd6a5fbe40b472845ac82d79e53c162dd78b8f48f915d3538f4d7b08e6187425b21534f9c8ecc66a66862f9c53d54efaf39a20aae0f7d69f4319b2b5f804712091c629d297b8a40771583361448b1cba403edbe16fee38e1d72d622b438284ea21ded883323d75b181ab19ba5c1c44644a0382e65fd71255b8fb97594410078c072c258b05bfc80c598705536a7416539f22d2612b08c873577974fee8b51fe2cc152294c2eaf24ec9755be3764c70a2395058ac61505c424d1112a8d47224a218a236436a23256726311b2a4f76bb35c35b5190f40918cb3d5bf42710c41d83830053ecda31eb7605a659c1216f3ca8721eaa627602b9cc064259f85cff3268cf896e56e48dc375980f698131af4321e5acc67cfe53367bbbba455dd2325a354d14c665e49e4d33c920e5e29e030c12d3259e1222ec413e810eda121183fa84bf6033663e2908c0117fe53b722666258cf0c1c9cd2489fe8c265599686dbe798f9eb7c11170b4ebb7b023d227de695a03b7de5a63e60095d091ea2f55bb1625526be6507342c3460ca80225efe20087ad27e90afcf273b99aa792402fdab0d1a38de9b9d762c859cdc2347b03382e702e5e828868193041903c4cc0923c983c85995cfe38d420d26775c0d14897680ecc48c4b755b327c7460e89a7f7e41fdbfdb71b3891bae791fde2e18f49c88e0f8ad031a977fc7d37d1b671d29e19f8a2e63d05d4576ffd54a007ebca6c415ade8d296cef373d60b0dc36bf89576216a21e653a9344cfd8ef6eb872f9bd614d46610c7459b42a4680c3097cb6e08081340413294120f87bfae6f8ea50513bbad3a61a878098d1cd5a233077b1e88690339fecaf028e4fa8d4b6a9a04ad58e8b85f50ed7a0e6f4c4442932b919faabf41b7f38a197373a50671c003e4df494a619bf8306d75859e2065fbf5dfa2a5102925dc70a70c390f9e511ce18d6cb3c8501007f6f499800549f873fed780d9822405ef6d1c4c5ddcab1ecb9f6a8dcd690e230188facc54b39d9ce0ecf04f140137f3ae1c3ca772dcf715e5b51f42c1e47bf0ed01846315a2e3f1b72d1da3459bb5a14bd74f4946a4b46bd2da9e81f1ecc32033ee97724b3b23a65c2b0c03c80e37380c37cc7025ca496e1f7510ef002a7d9fd7ff63eac6d9b163b52ef93bddae4d056c4f95e8b9fa05c371cdaae262d390352be859f53dab4724d30e1475f93a48a5d14717c0e5c4765699cb1b9613ba885d05659ad55b4bb649efbf7827d2fb3d8aabb64cc3f24389d651f15471cf6bed7410d5ad4738868d175f6125fd1ef296579f2e944f06129f37634ead01090869f931f90c7a54d8f861b6757813489a6049fb84080ba5cec0c5fab12155666e226082d4145bac673ab53d6d95c53f30bf34e2678f2ef88813681c024aef6f1d7b09713fcb0ccead75a28e09b81cedcffeb3ce889efa909b3fbf14ffdd51262d9d9a8a745dd1dd4bbeb72f9ee4c24b74b41db503d125b558629b03693f957a49fafbc457ad28a2a23faa56baf58f31fee958118a887e9840f98f92ce2395c4bda6fb0886e615af8d78212a8ef68c82ed01f405882dd0f413f548a290b5d88ba7231b3c9f3a8b97f1d13ac2926191b77ddc6eb1af9ae7d3ea41a2d11e5b4e3ca7624d52f0528f685b4fb96e1c605d7ae2ab2ea6a4e7bccff735fca5056739b9cc2cf7001738216cdcb5d33edf6d356b0d4167c42221f175e22362fbbb22d0fc01f9b13776927758ea1154f18c50cb15a82515eb9b478700b3d9fbb9214cdf10a0cbb7644fdd15cc19ee0f5efca5f00099425879194b041c6cfe92841b766be43edf06aac3211fffd994b3beeb7fb7d34a338d08a6c0bbad896a89569a2cb22c5998b6a5afd025d853f44287f4b95497b23ca91801fe1f049ab7246075fcb773adeed65a95ee9e217c31b0bdaf716831795ff1d258d02db963f94afcc910e878450d35e29cfb780b17b95174af947de6c2e02f52080f6055e160f0b0d28162bc351db36d149961c0844df7d0ca5939fc8aacce9de8d80b8a6e1fc18718ffc2300a18d617ff992567161b090bb97a61740171fd3e17d71ee5e3324f9f5a7581f0f36b47cd5ef77d3d2b2b122273e2f5cc398ba568833a85bae2c1624545fd1f37021c36eb98e37f0e8dcb385ddf1e6bd1a6f76ae6f89fe3276c51525e0bfeaff86a9273518693a0dd14ceb507fc2fbe064587db8ab2cfc7eec09e8e64df41e625f5abb5611d016d22e83ea7f6eb5f6be2eb8d7b1d35dec9aeecbb1145d2e3297212bcaee9e30ecdcd7a3c462d1892ea867160bc5ef8907e39613c45af9b009796cf14ea662f29ad78781a29e9e08b5b5c2c63c338b4c1b1d16eb2bdbbb4450ec7e1bda5870030b103948bb7aaa661b361a58e2f3df69332a1b913dfc5f45f1ef7a385b55583fd8899028f494f7da481b031fe1d5f45d08e385d5ebe99c0920509971cad9d79a26f0fb61df4e101eb2cffcd611cf66845cb677fcdfc317dc21f9c2f87de96ba13a2e00a9c2f7fa5a37802e231c2dbd254b277448a703dc418d837fd9df7811e190bbfdc408f31cc4169bc39d15795737809830076c9712acc2cbffff6be511d2a27b1ff148f1ab5aa568f4b0b9651a9a40220fce3f8c943ca700cada2", 0x1000}], 0x2, &(0x7f0000003bc0)=[{0xd8, 0x102, 0x0, "e3c2b46b36c735e82a39cc0cc161a384772865780b7f80178f58cd14fa312f52d3e2c95c1d9126ead736e20171c31693b7b5f5e2087308da9a05c6b13ab17409dcc0048ad5a7861f354cbbb8eb2da75dd4604f7ce8c42c94b5aed26ad08f375c91975695580e25b1b7eb924d8b1360661cc7be67e1ba5bbedca5f1aed36e2d3e78c7e9c76fb6acdaf85070a7cec76363a8621d80cf3190c9064fb5769ec78bb6bfa949fd24c66ec69d11ffcb23477e68d3821ab949c274f7bbc9924d962ab8268cd9a9"}, {0x100, 0x10b, 0x7, "a64d315c27809fb58df0b534af13993d531f98654ba45e428ba2e50a72625ad518d4e159ab82f62e3429b390eb3540d7e8ae9c16031888ea69dd711733ee5a250c9abb4e5527bcbc5bd5c53f078113bd91618abcb04102be4e470550f65c79d9721578c98e7ebe3a93930dc0758af85d238175a24270003d51d18886c0d7f60d959d7bef7db274b9b553ecaf8901e604bf91e446c10cdbe054aace16eb181a6c8fcff360ac41fb8838d32a2f06bb376c9ebcc2492a819f957b0c8f4a58af6a87b33c0659858e4e70e75edd8ddc2752742816c44ef04cbec6c4c26bc063953c9226a9ae622fff53a8c3"}, {0x18, 0x10a, 0x3ff, "8138188e92"}, {0xc8, 0x10f, 0x400, "0be70de0d5d34cffbe447707fb59583402ac4417ff72bcc7ed293b19562e82efa6a1e1ff7890d7c48b6e5dc982e7a0f71b5c7305f0c0e69ab4fb9aa703759d4e58c32026677556f51facbd30356459c6b6d1f33e89bd2189b36f921fe976f9056486772e84c9a4c4d524d068df95b409a36d533b28938d2345343afa88fcb42582dae6e1d079602f5ab37aa9a2e08db9bb4a63898836ba4abecc8c5bf8e4029c2ae54949be63b2bcbccad222730f090d31787e4dff"}, {0x28, 0x88, 0x1, "1255fb9360df9090fc0ae45b36d48f1daa9846c854f9"}, {0x88, 0x6, 0x3ff, "3e2b342473efb84104f8880d795a7be2f1ed2c5c7b0709c7d76c63f2744c6fa821c8fbbf1395358518eb660e4530aa19bc5ddaae70447e36697f8e7507d102a80daaa073cfcdbe1c06c512f0a9dff43f82bbc9e960684c13f17dd431d2c03eb13344b1862b2b7d998f96900af3e4026390"}, {0xf0, 0x19d, 0x7ede0937, "4f0e465e22236c2e12b11ec1ce816b67be5c900366225046cc52059192259f3fe4453ce9c4a9913bce1ea4d8fa14e714dc00f27b8bc7b6571770d67e681f953bcf07f4eb12f36a8bc18bdba3fe34f9f9a3bfbb5f362d403b7b0465b680cf7e9729d5a1cf74f9b4282c71467af89cd32df2a0f57d0b807abd5815eb287ccc33992ccc138ab7443720a5ba659529905c5645a0b443e218ed46f410454c84aae8ad2498fb38ca53f2590bf86e81dbb901d03282724f9b8e0ba73ad6f5a30d38f5e4af4fd78608cc26b63e543aca3dc20ca3e6329a787b214b0619"}, {0x78, 0x118, 0x20, "815195299662c4d5f057d9842a0843e95ba190e62fe6bdbc31b86f778717839bc09890c2edc75ea4791e9bb51d660eb91bea1096692b084d44be280d49bed520da2aadbfa395d5ed328940fbb2e936fccf5e5e8dd576221975496cab34026768d2"}, {0x78, 0x112, 0x5, "2e0d91b10d9ca6d91ee174529d03998071d2448504fa02640be3e4fa6a8a73eceb64fe355d973fe96327f9422e1e1ead13d4706edd3bdb2d3801b7cbb535877dfcb5544a44010204ad01b24997c6ba429f8f5f17f59ed5b8181683555592db602b729751a982"}], 0x548}, 0x4}], 0x7, 0x40010) flock(r3, 0x5) ioctl(r5, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet6(0xa, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f0000000180)={0x0, @bt={0x120000000, 0x101, 0x0, 0x0, 0x9, 0xba69, 0x7, 0x80000001, 0x7, 0x100000001, 0x401, 0x200, 0x0, 0x8, 0x0, 0x20}}) 12:06:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x500000) 12:06:13 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) listen(0xffffffffffffffff, 0xffffffffffffff7f) recvmmsg(0xffffffffffffffff, &(0x7f0000005b40), 0x0, 0x40, &(0x7f0000005c00)={0x77359400}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000005c40)={0x0, 0x3, 0x20, 0x0, 0xc}, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000200)=ANY=[@ANYBLOB="d1a42e59f0b277a8c41f410711b27ac820bdb44f9255a1d26c3b45f714ba6d9b88e991dedfdcfb48425c1fd4ecb110ee8ff894c37025ce842c808fba883899a48f6d7e33e1db781e68f3129558a6bfbe969b22dd9c2a9021987ff7f90326ce22f3307373df2fa9f25dbe23229a2da9da023d777cf8de019050a9915f288c9c56c3"], 0x1) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, 0x0) r1 = memfd_create(&(0x7f0000000140)='^\x00', 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f00000013c0)=""/4096, 0x1000}, {0x0}], 0x2) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r1, &(0x7f00000ddff8)=0x3, 0x102002700) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x1011c0, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f00000003c0)={'mangle\x00'}, 0x0) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x2, 0x0) ioctl$VIDIOC_G_STD(r2, 0x80085617, &(0x7f0000000000)) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) writev(0xffffffffffffffff, &(0x7f0000000580), 0x0) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:06:13 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepade', 0x3d, 'none'}}]}) 12:06:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x20000000) [ 759.856347] hfs: unable to parse mount options [ 759.909203] hfs: unable to load codepage "none" [ 759.915516] hfs: unable to parse mount options [ 759.945727] hfs: unable to parse mount options 12:06:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x7ffffffff000) 12:06:14 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepafe', 0x3d, 'none'}}]}) [ 760.157748] hfs: unable to load codepage "none" [ 760.184841] hfs: unable to parse mount options [ 760.253433] hfs: unable to parse mount options 12:06:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x50000000000000) 12:06:14 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0xfcfdffff, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f1648a911993f0265df5cf1cdd8b55b062950b86bc90e85100000000000000ebf8cb414d08c4bce6d48566b4f7b663ea21fb5850096ea35e7f70a7d0bafa1dfdc3a5098ad656fbb1cb17c19fbe1d678bca4f83fd0b39e833114c06f0858c20edc730fda2b2eb52887bfeea28c5228d4beb50779c4e88564dacd7582c4adefc79fe4c833c569723796a78328d383832a5e19a", 0x93) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYRES64], 0xfffffd34) recvmsg(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 12:06:14 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepahe', 0x3d, 'none'}}]}) 12:06:14 executing program 2: openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000000)={0x79, 0x0, [0x404]}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000001940)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfe2f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000100)) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet6(0xa, 0x0, 0x0) 12:06:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0xf0ffffff7f0000) 12:06:14 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x400400, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') socketpair(0x1, 0x0, 0x80000001, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x20000, 0x0) sendmsg$NBD_CMD_STATUS(r0, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x78, r1, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x4}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x6}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xd}, @NBD_ATTR_SOCKETS={0x14, 0x7, [{0x8, 0x1, r2}, {0x8, 0x1, r3}]}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xff}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x78}, 0x1, 0x0, 0x0, 0x840}, 0x4000000) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f00000001c0)={0x14, 0x88, 0xfa00, {r5, 0x10, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r5}}, 0x10) [ 760.583313] hfs: unable to parse mount options 12:06:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x2000000000000000) 12:06:14 executing program 4: pipe(&(0x7f0000001c00)={0xffffffffffffffff}) ioctl$SIOCAX25DELFWD(r0, 0x89eb, &(0x7f0000001c40)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept$alg(r1, 0x0, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x8000) getsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000000040), &(0x7f00000000c0)=0xb) write$binfmt_script(r3, &(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYRES64], 0xfffffd34) recvmsg(r3, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 760.638919] hfs: unable to load codepage "none" [ 760.644032] hfs: unable to parse mount options [ 760.671414] hfs: unable to parse mount options 12:06:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000080)=0x72, 0x4) bind$inet(r1, &(0x7f0000000700)={0x2, 0x4e23, @loopback}, 0xffffff76) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x47, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x331) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r2) r3 = msgget(0x0, 0x240) msgsnd(r3, &(0x7f00000001c0)={0x2, "b2337570f853686b2acb14751371db5afdb2979cbebbc7c45716db75b4346fd02cb630b8e8ae16a60b1443537a52b5849835572e3569045a8e8ff3757837142b10aff637fc240feb3b3ac927fecbf7f09d07db2ec2efea02c6abc8b9406e9d36f856a565a4a5d091d3adf7ff16e48fd3424ce3c09cb40b48abc63e4b7206bdeeea13b5b081b0501d2963f9423cc9767f2adc126a1454935177b31cf93eeb2d42c1ff120fe3c99bf2f144c7068276ad0c725437233e3754303d99039e70e0dd7fe470b3106c7a409c54a164454f72f939ed68d707e5d96f3978f25970891938cfdd43ca7d2f1072467000fc8aec273957da1b3ffd5591"}, 0xfe, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-monitor\x00', 0x40000, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r4 = socket$inet6(0xa, 0x4, 0x6) getsockname$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f00000000c0)=0x1c) [ 760.722808] kvm: vcpu 0: requested 34784 ns lapic timer period limited to 200000 ns 12:06:14 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepaie', 0x3d, 'none'}}]}) 12:06:14 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0xfdfdffff, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = accept$alg(r0, 0x0, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x8000, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f0000000040)) ioctl$VIDIOC_PREPARE_BUF(r3, 0xc058565d, &(0x7f00000000c0)={0x5a7, 0xea94b7f52cda8973, 0x4, 0x1, {0x0, 0x2710}, {0x3, 0xe, 0x8000, 0x4, 0x8ea, 0xffffffffffff4590, "097b54fc"}, 0xff, 0x5, @userptr=0xffff, 0x4}) write$binfmt_script(r2, &(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYRES64], 0xfffffd34) recvmsg(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 12:06:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) [ 761.028651] hfs: unable to parse mount options [ 761.096187] hfs: unable to load codepage "none" 12:06:15 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepame', 0x3d, 'none'}}]}) [ 761.130168] hfs: unable to parse mount options 12:06:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400000, 0x0) getsockopt$inet6_udp_int(r1, 0x11, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 761.268547] hfs: unable to load codepage "none" [ 761.300151] hfs: unable to parse mount options [ 761.310277] hfs: unable to parse mount options [ 761.471249] hfs: unable to parse mount options 12:06:15 executing program 2: openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000480)={0x79, 0x0, [0x404]}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000001940)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfe2f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) r4 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f0000000100)) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet6(0xa, 0x0, 0x3) 12:06:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 12:06:15 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0xfdffffff, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x4000, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x59, 0x4, 0x8, "9d2c8f85d325fed0d1a33ba3cbd907d6", "8a8d1b67df49f0732ef2ef77be6a6b3cd5469e28293d4bbdfde244c2bfec694b4a45e3b0fd7bd75326cfa224acde4a0e29aedf89302da8129399dc86af0aa4013045bf87"}, 0x59, 0x2) getsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f00000000c0)={0x9d, 0x7}) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-arm64\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 12:06:15 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepare', 0x3d, 'none'}}]}) [ 761.682964] hfs: unable to load codepage "none" [ 761.698364] hfs: unable to parse mount options 12:06:15 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='\x00\x00\x00\x00\x00\x00\x80') ioctl$TIOCGETD(r3, 0x5424, &(0x7f00000002c0)) set_thread_area(&(0x7f0000000580)={0x7a, 0x20001800, 0x4000, 0x200, 0xffff, 0x1, 0x101, 0x2, 0x843, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000480)={0x2a, 0x4, 0x0, {0x1, 0xbe, 0x2, 0x0, [0x0, 0x0]}}, 0x2a) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x2000000100000, &(0x7f0000444000)) mount(&(0x7f0000000840)=ANY=[@ANYBLOB="969957b52d25fea3a69444209691fd3e214c10d780c9b7762efad2628dcef5d3b6364e600019df9b5a4ff437b17171973b53d859e76946cce247fc6e16d6ea925ab9ea84e676eb2336b8bc339aadce6beb247a278eefb67ace6a2e35f316961c678f35342ebe17a9c081576fd821879c0998efe52a08ac8d0fd3a4043e21d89c6c066e39d056adb1f397734925018fb22a399c9de509914a58941f"], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f00000006c0), &(0x7f00000004c0)='./file0\x00', &(0x7f0000000680)='ramfs\x00', 0x80000, 0x0) r4 = dup2(r1, r1) ioctl$TCSBRKP(r3, 0x5425, 0x5) write$FUSE_OPEN(r4, &(0x7f0000000640)={0x20, 0x0, 0x5, {0x0, 0x3}}, 0x20) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r6, 0x80247008, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$NBD_DO_IT(r4, 0xab03) mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) preadv(r2, &(0x7f00000006c0)=[{&(0x7f0000002440)=""/4096, 0x1ba}], 0x10000451, 0x2) ioctl$int_out(r3, 0x2, &(0x7f0000000700)) link(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='./file0\x00') ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000140)) utimes(&(0x7f0000000440)='./file0\x00', &(0x7f0000000180)={{0x77359400}, {0x77359400}}) close(r0) [ 761.793785] hfs: unable to parse mount options [ 761.842996] hfs: unable to load codepage "none" [ 761.850596] hfs: unable to parse mount options [ 761.866398] hfs: unable to parse mount options 12:06:15 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0xfffffdfc, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYRES64], 0xfffffd34) recvmsg(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 12:06:15 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x130) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0xfffffffffffffdcb) getgroups(0x3, &(0x7f0000000200)=[0xee00, 0xee00, 0xffffffffffffffff]) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setresgid(r2, r3, r4) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000140)=""/89, &(0x7f00000001c0)=0x59) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) 12:06:15 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepase', 0x3d, 'none'}}]}) [ 762.118314] hfs: unable to parse mount options 12:06:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = creat(&(0x7f0000000200)='./file0\x00', 0x80) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f0000000240)={0x1, 0x0, 0x0, 0x2, {0x3, 0x7214, 0x7, 0xe4d7}}) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x80, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000080)={{{@in6=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@initdev}}, &(0x7f0000000180)=0xe8) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f00000001c0)={0x3, @default, r3}) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x100, 0x8042) [ 762.185909] hfs: unable to load codepage "none" [ 762.197699] hfs: unable to parse mount options [ 762.211967] hfs: unable to parse mount options 12:06:16 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000440)=0x4, 0x4) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r4, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000140)={0x34, 0x0, &(0x7f0000000100)}) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r4, &(0x7f0000005fc0), 0x800000000000059, 0x0) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1}, 0x10) write$FUSE_LSEEK(r3, &(0x7f0000000300)={0x18, 0xffffffffffffffff, 0x6, {0x7}}, 0x18) geteuid() pipe(&(0x7f00000003c0)={0xffffffffffffffff}) setsockopt$packet_fanout_data(r5, 0x107, 0x16, &(0x7f0000000340)={0x1, &(0x7f0000000040)=[{0x0, 0xffffffffffffffff}]}, 0x10) [ 762.379863] hfs: unable to load codepage "none" [ 762.403164] hfs: unable to parse mount options 12:06:16 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepate', 0x3d, 'none'}}]}) 12:06:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x80000, 0x0) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x3ff) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 12:06:16 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:16 executing program 2: openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000480)={0x79, 0x0, [0x404]}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000001940)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfe2f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f0000000100)) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet6(0xa, 0x0, 0x0) [ 762.714148] hfs: unable to parse mount options [ 762.758561] hfs: unable to load codepage "none" [ 762.763449] protocol 88fb is buggy, dev hsr_slave_0 [ 762.763524] protocol 88fb is buggy, dev hsr_slave_1 [ 762.763638] protocol 88fb is buggy, dev hsr_slave_0 [ 762.763691] protocol 88fb is buggy, dev hsr_slave_1 [ 762.769217] protocol 88fb is buggy, dev hsr_slave_0 [ 762.788860] protocol 88fb is buggy, dev hsr_slave_1 [ 762.794040] protocol 88fb is buggy, dev hsr_slave_0 [ 762.799160] protocol 88fb is buggy, dev hsr_slave_1 [ 762.806181] hfs: unable to parse mount options 12:06:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x10000, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f0000000040)={0x0, 0x10, [0x3ff, 0xdfa7, 0x9, 0x1]}) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 762.851211] hfs: unable to parse mount options 12:06:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7b3470e86a4a5245511ee7ab89b8792dbde7065203a5d27c5374355710384f8ec11f1181a16198680dfae585b39089a4f662dd01f71f8c8257dfe8031f1ffe1967d2e2dfddffa8f3fd4f18bdfd90c2101deb7e9e48fad91690849ba56e9b9aeae1a06981cd368cbf50d7fbd1803a81db362f6ec5225c3938ff46a0dbed11c857090cf7023721390e07f213ccd3b3d2c0142591d7a5460bd7996fba3ff3cd913424ae9ed5d96d8a7b5a927d99078d864c6d7ffc58e6417d22faa6324c91f71be256b7b1abefa891fa69d13e9ea6b18e17dd8ee28d72fc9c5db2e729bd6ac1d39168b10f6237b205358874fc77c14c02b8df126f07b8c142be47e7b", 0xfb) r1 = socket$kcm(0x2b, 0x7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x0) recvmsg(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 762.924155] kvm: vcpu 0: requested 34784 ns lapic timer period limited to 200000 ns 12:06:16 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepaxe', 0x3d, 'none'}}]}) 12:06:16 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0xffffff7f, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 763.135228] hfs: unable to parse mount options 12:06:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0xffffffffffffffa1) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = dup2(r0, r0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000040)=0x4) 12:06:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400201) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYRES64], 0xfffffd34) recvmsg(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 763.283466] hfs: unable to parse mount options [ 763.345578] hfs: unable to load codepage "none" 12:06:17 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepag\n', 0x3d, 'none'}}]}) 12:06:17 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000440)=0x4, 0x4) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r4, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000140)={0x34, 0x0, &(0x7f0000000100)}) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r4, &(0x7f0000005fc0), 0x800000000000059, 0x0) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1}, 0x10) write$FUSE_LSEEK(r3, &(0x7f0000000300)={0x18, 0xffffffffffffffff, 0x6, {0x7}}, 0x18) geteuid() pipe(&(0x7f00000003c0)={0xffffffffffffffff}) setsockopt$packet_fanout_data(r5, 0x107, 0x16, &(0x7f0000000340)={0x1, &(0x7f0000000040)=[{0x0, 0xffffffffffffffff}]}, 0x10) [ 763.392958] hfs: unable to parse mount options 12:06:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000580)) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x80, 0x88000) getsockopt$inet_udp_int(r1, 0x11, 0x6e, &(0x7f0000000040), &(0x7f0000000080)=0x1c6) syz_mount_image$nfs4(&(0x7f0000000180)='nfs4\x00', &(0x7f00000001c0)='./file0\x00', 0x4, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000200)="026354f02c04f57da96259771936373dddb76f15845908e611ac4bf71c17fd8b1d0f4edf85044c4ee0655181538b950e9658cfd78cbf2a1d8ea8aed7230a02c7e2de34b0981e0215e4591c14d789a8771784fed3e1e292d2fffdad00219a80dcee21984ddcfc34dacc66b3c23712d4", 0x6f, 0x6}, {&(0x7f0000000340)="7aefb7e9c571d1d1b5a43afc26b99e41dc18e5b64d40d404c3de9a3c3953bdbb9c83483a6cd0aa528ca7f922afc9b76c28862c06a68de1d0c8dae9ec43290e2b289907d4783312b5c6f3c5046d33eafbe8e4a54b4a9b35cdbb74e4fee341722d6ceb17ec1e4b8544bb5f08cd2dfd826450b30e9fcc3a2e8d12b6c9cf487b41e5e367ba4dc5a504248214f8", 0x8b, 0x7}, {&(0x7f0000000400)="94ad35f1ef174c0f3a3a71b311d5c0430348be9d0a773a56d6ae67c40883b9dce67c4f773f96f002fe33c7893f528f6ed619071d442874ed280fbe9aae8f56f04a1854f2c97ba9bc562d145b91c92a06b36eaa944a3bed3ca106b2e0", 0x5c, 0x6bcb800000000000}, {&(0x7f0000000280)="21c0d30d47279ad6ebd9f5498ad4470ded52a3369b9bf4f49ecf5a33ecf2", 0x1e, 0x8}, {&(0x7f0000000480)="c7775bf1b9f929472bebcb45b51ece6fcf56", 0x12, 0x3}], 0x0, &(0x7f0000000540)=']mime_type\x00') setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r1, 0x0, 0x1, &(0x7f00000000c0)='\x00', 0xffffffffffffffff}, 0x30) r3 = geteuid() r4 = getgid() setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={r2, r3, r4}, 0xc) [ 763.503794] hfs: unable to parse mount options [ 763.516111] hfs: unable to load codepage "none" [ 763.548101] hfs: unable to parse mount options [ 763.629948] hfs: unable to parse mount options 12:06:17 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:17 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepag%', 0x3d, 'none'}}]}) 12:06:17 executing program 2: openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000480)={0x79, 0x0, [0x404]}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000001940)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfe2f) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000000100)) ioctl$SIOCX25CALLACCPTAPPRV(r5, 0x89e8) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x52c02, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, &(0x7f0000000040)={0x5001, 0x3000, 0x7, 0xffffffffffffffea, 0x2cf}) 12:06:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xc424, 0x224000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40008000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="d0010000", @ANYRES16=r2, @ANYBLOB="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"], 0x1d0}, 0x1, 0x0, 0x0, 0x11}, 0x20000000) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, &(0x7f0000000040)=""/148, &(0x7f0000000100)=0x94) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r0, 0x6, 0x100, 0xff, 0x1f}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 764.018449] hfs: unable to load codepage "none" [ 764.023552] hfs: unable to parse mount options [ 764.032483] hfs: unable to parse mount options 12:06:18 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) [ 764.148721] hfs: unable to parse mount options [ 764.187939] hfs: unable to load codepage "none" [ 764.192988] hfs: unable to parse mount options [ 764.203088] kvm: vcpu 0: requested 34784 ns lapic timer period limited to 200000 ns 12:06:18 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in6=@loopback, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) r3 = dup3(r1, r2, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r5 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = accept$alg(r4, 0x0, 0x0) write$binfmt_script(r6, &(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYRES64], 0xfffffd34) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x2, [0x0, 0x0]}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000100)={0x0, 0xa5ed, 0x8, 0x5, 0xfffffffffffffff7, 0x1, 0x3, 0x7, r7}, &(0x7f0000000280)=0x20) recvmsg(r6, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x800000000000000) 12:06:18 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, '\none'}}]}) 12:06:18 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0xffffff97, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000631000/0x4000)=nil, 0x4000}}) r2 = syz_open_dev$media(&(0x7f0000002600)='/dev/media#\x00', 0x0, 0x0) ioctl$KVM_IRQ_LINE(r2, 0x4008ae61, &(0x7f00000002c0)={0x1000, 0x5}) mlockall(0x1) ioctl$EVIOCGKEY(r2, 0xc0487c04, &(0x7f0000000000)=""/226) ioctl$VIDIOC_STREAMOFF(r2, 0x40045613, &(0x7f0000000280)) tee(r2, r1, 0x1, 0x1) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000100)={0x0, 0xea, 0x10, 0x81}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000001c0)={r3, @in={{0x2, 0x4e20, @local}}, 0x9, 0x3, 0x10001, 0xb15e, 0x21}, 0x98) 12:06:18 executing program 3: r0 = accept(0xffffffffffffff9c, &(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000140)=0x80) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x400, 0x80000) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000040)) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(aegis128l)\x00'}, 0x58) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) [ 764.492859] hfs: unable to load codepage " [ 764.492859] one" [ 764.511228] hfs: unable to parse mount options 12:06:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) tee(r0, r0, 0xde99, 0x1) [ 764.643452] hfs: unable to load codepage " [ 764.643452] one" [ 764.657933] hfs: unable to parse mount options [ 764.687181] hfs: unable to load codepage "none" [ 764.693722] hfs: unable to parse mount options 12:06:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept(r0, &(0x7f0000000000)=@isdn, &(0x7f0000000080)=0x80) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x2b}}}, 0x7ff, 0x4, 0x6, 0x4a, 0x1}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000001c0)={r2, 0x9, 0x2}, &(0x7f0000000200)=0x8) 12:06:18 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, '%one'}}]}) [ 764.819539] kvm: vcpu 0: requested 34784 ns lapic timer period limited to 200000 ns 12:06:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x14000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000040)={0xffff, 0x1, 0xf385, {0x77359400}, 0x5}) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 765.001789] hfs: unable to load codepage "%one" [ 765.008892] hfs: unable to parse mount options 12:06:19 executing program 2: openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000480)={0x79, 0x0, [0x404]}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000001940)={"a523fb9656eb871ffcd7ffeb51d84e738a55eba841ae487e33cdd921e8a51ce6c924020f0ac3562dd8cdeb31deac16f46da4ac16ee8165bce439eddce671c5b0a1103ea3f86a43cbb78504f6f9c77c2f09dc27632ec6036ee52a87e321e707c0cfe15576c26d52d0334c8d4693e127b3a046a5ed7796c9c5017cfd58ec871ed76369846fea9ebfa2f7f96496abf4ef57ed1ecd930eb9e13396875f01e932804ffe8a34c8fbedd97cdfb3176ec59fbbfd20a6ff17795431c341a35eb0f5f703480a5211cc6a7e2084e4a9b6aedf60b7b8084b00ca2cbed255b4cc4679c967432fea5e95119f9635e94794aab6ef54f290677fa08d0ee2cc8eae468efd02417055d3f3ccc86b629dfb878c4d115c16c75fe352cffa93648cf49577256b5d2faf0634335c97ffff966ae90cbf81250df3613c25d2789c869c9cc95a6e9d364c4c684059c593f9950e66cf81cd9f36d73fade4f0cbb795010364d13ff32c12efd91d0ebb6533700945f2db6113a630bd521eec89a74c46e1733b72d6e4d2ccee3b40f99809a9a4fb5fc2d1c53e1366d455bcbe81893100ab56b2556b55c1a0c5787356b464c3bf7011488e55f587a6d4420d46d69a74ee5bbfbcb0d6cb00aae8c3dfd6dd2e9f76d7a542f20553207b668dce69f1b463ee9166e81bb109f461b8885f15c9e525d72260ccdbd69e3345612158114780b9409ea856cb724faa6ed27ba836b35c10e7c7d43f2fa34f98f16a00f31565e16a213eaf4a7f438c89733ebe6d16328b930fd942bc64d631dd1f2aa1cc2ccdaff2324076c83e1ba4d2a0e40e010c96b42e7a4a76cd7a89ef592b9b3030f62d9fbd565ee5908ab90b42620b61e5d1e08621a31d21003cd12a450461636472fa64a7e1b98778bfb482fb4b4da31b42ee98b10f9c0f4c085d08c37ee2e3a9e4a5aff72a0ab844fcbfa224842c85f6cdfd25829c44760e3859624f891df4824f7d17938ac2dee1412cf3083e1d5ee2d29b63267ccba535409da7bef05d3fa79a3ef037ee609e01ad345ee17f48b5e8510f767de35df4dfb856f7533ad88866c6b01fe345107ba7191a8809e2e014492acf9c4f35cad664198a65c55f884490f4b30b4526324be842c393f336f16bea2bf6c6b917fdb751e12ff689ab4ffa44625a8b2bc1de4e88682abe5ce9d1942792747681ad23c31046d825140987f19a9cf10323c3f50a20f35a6d1dd8ca6758296b4537a0da1a853011b777623c8774b3689897cf9264a7782470847f36a8093f04000000663438ab39d8a777fb3e10cb4a2402a939a98d387087c5ca5fd8fbc4d96ae698b5bb84a0a8484e2b85743e623a033eb5b1889ccfb4b95885bc69d4c1cb819b95e7923e557c9ec9ec10e94d1e1295fc2f256fa095036f6cfc04c414fc57fc72c120614a586089c93741e97a61c46600"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfe2f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f0000000100)) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet6(0xa, 0x40000000000002, 0xfffffffffffffffa) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000, 0x0) 12:06:19 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x129) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000000040)={0x0, 0x1, [0x80000001, 0xf8, 0x7fff, 0x81, 0x1, 0x101, 0x5, 0xee3]}) socket$alg(0x26, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 765.144605] hfs: unable to load codepage "%one" [ 765.158209] hfs: unable to parse mount options 12:06:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0xfffffedc) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYRES64], 0xfffffd34) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) connect$unix(r3, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e23}, 0x6e) recvmsg(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 12:06:19 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'n\nne'}}]}) [ 765.201224] hfs: unable to load codepage "none" [ 765.206046] hfs: unable to parse mount options 12:06:19 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040)=0x3fd, 0xfffffffffffffeb8) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xb, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000080)={0x0, 0x5}, &(0x7f00000000c0)=0x8) socket$netlink(0x10, 0x3, 0x1f) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000100)={r0, @in={{0x2, 0x4e21, @local}}, 0x80000001, 0x0, 0x6, 0x3, 0x8001}, &(0x7f00000001c0)=0x98) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000000280)=0x1) [ 765.396051] hfs: unable to load codepage "none" [ 765.409287] hfs: unable to parse mount options [ 765.593621] hfs: unable to load codepage "n [ 765.593621] ne" [ 765.606850] hfs: unable to parse mount options 12:06:19 executing program 1: perf_event_open(&(0x7f0000000140)={0x100000000000002, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000df1000)='./file0\x00', 0x100) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) creat(&(0x7f0000000140)='./file0/bus\x00', 0x0) fallocate(r0, 0x0, 0x2, 0x401) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f00000000c0)={0x3, 0x1, &(0x7f0000000000)=""/39, &(0x7f0000000080)=""/21, &(0x7f00000001c0)=""/160, 0x1}) setxattr$trusted_overlay_opaque(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x1) 12:06:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) ioctl$BLKROSET(r1, 0x125d, &(0x7f00000000c0)=0xfffffffffffffffc) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept$alg(r0, 0x0, 0x0) time(&(0x7f0000000000)) write$binfmt_script(r3, &(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYRES64], 0xfffffd34) recvmsg(r3, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 12:06:19 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0xfffffffd, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4012000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xe8, r2, 0x101, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xc000000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x101}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000001}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x40}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_DAEMON={0x90, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x526}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syz_tun\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x17}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}]}]}, 0xe8}, 0x1, 0x0, 0x0, 0x800}, 0x80) io_setup(0x80000001, &(0x7f0000000340)=0x0) io_destroy(r3) bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) [ 765.736047] hfs: unable to load codepage "n [ 765.736047] ne" [ 765.754305] hfs: unable to parse mount options 12:06:19 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'n%ne'}}]}) 12:06:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 765.908569] hfs: unable to load codepage "none" [ 765.920891] hfs: unable to parse mount options [ 765.995758] hfs: unable to load codepage "n%ne" [ 766.006577] hfs: unable to parse mount options [ 766.129802] hfs: unable to load codepage "n%ne" [ 766.132023] kvm: vcpu 0: requested 34784 ns lapic timer period limited to 200000 ns [ 766.134631] hfs: unable to parse mount options 12:06:20 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000480)={0x79, 0x0, [0x404]}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000180)={0x401, 0x2, 0x2, 0x880, 0x4, [{0x1, 0x6, 0x0, 0x0, 0x0, 0x400}, {0x6f81, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xc00}, {0x8000, 0xfff, 0xffffffffffffffe1, 0x0, 0x0, 0x2002}, {0xab37, 0xff, 0xdb, 0x0, 0x0, 0x2604}]}) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000001940)={"a523fb9656eb871ffcd7ffeb51d84e738a55eba841ae487e33cdd921e8a51ce6c924020f0ac3562dd8cdeb31deac16f46da4ac16ee8165bce439eddce671c5b0a1103ea3f86a43cbb78504f6f9c77c2f09dc27632ec6036ee52a87e321e707c0cfe15576c26d52d0334c8d4693e127b3a046a5ed7796c9c5017cfd58ec871ed76369846fea9ebfa2f7f96496abf4ef57ed1ecd930eb9e13396875f01e932804ffe8a34c8fbedd97cdfb3176ec59fbbfd20a6ff17795431c341a35eb0f5f703480a5211cc6a7e2084e4a9b6aedf60b7b8084b00ca2cbed255b4cc4679c967432fea5e95119f9635e94794aab6ef54f290677fa08d0ee2cc8eae468efd02417055d3f3ccc86b629dfb878c4d115c16c75fe352cffa93648cf49577256b5d2faf0634335c97ffff966ae90cbf81250df3613c25d2789c869c9cc95a6e9d364c4c684059c593f9950e66cf81cd9f36d73fade4f0cbb795010364d13ff32c12efd91d0ebb6533700945f2db6113a630bd521eec89a74c46e1733b72d6e4d2ccee3b40f99809a9a4fb5fc2d1c53e1366d455bcbe81893100ab56b2556b55c1a0c5787356b464c3bf7011488e55f587a6d4420d46d69a74ee5bbfbcb0d6cb00aae8c3dfd6dd2e9f76d7a542f20553207b668dce69f1b463ee9166e81bb109f461b8885f15c9e525d72260ccdbd69e3345612158114780b9409ea856cb724faa6ed27ba836b35c10e7c7d43f2fa34f98f16a00f31565e16a213eaf4a7f438c89733ebe6d16328b930fd942bc64d631dd1f2aa1cc2ccdaff2324076c83e1ba4d2a0e40e010c96b42e7a4a76cd7a89ef592b9b3030f62d9fbd565ee5908ab90b42620b61e5d1e08621a31d21003cd12a450461636472fa64a7e1b98778bfb482fb4b4da31b42ee98b10f9c0f4c085d08c37ee2e3a9e4a5aff72a0ab844fcbfa224842c85f6cdfd25829c44760e3859624f891df4824f7d17938ac2dee1412cf3083e1d5ee2d29b63267ccba535409da7bef05d3fa79a3ef037ee609e01ad345ee17f48b5e8510f767de35df4dfb856f7533ad88866c6b01fe345107ba7191a8809e2e014492acf9c4f35cad664198a65c55f884490f4b30b4526324be842c393f336f16bea2bf6c6b917fdb751e12ff689ab4ffa44625a8b2bc1de4e88682abe5ce9d1942792747681ad23c31046d825140987f19a9cf10323c3f50a20f35a6d1dd8ca6758296b4537a0da1a853011b777623c8774b3689897cf9264a7782470847f36a8093f04000000663438ab39d8a777fb3e10cb4a2402a939a98d387087c5ca5fd8fbc4d96ae698b5bb84a0a8484e2b85743e623a033eb5b1889ccfb4b95885bc69d4c1cb819b95e7923e557c9ec9ec10e94d1e1295fc2f256fa095036f6cfc04c414fc57fc72c120614a586089c93741e97a61c46600"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfe2f) write$capi20_data(r0, &(0x7f0000000280)={{0x10, 0xb8, 0x4, 0x81, 0x7, 0x7f}, 0x24, "04e2ae7096258b832e879ee51034e3938ae701fb16b416b122afd55614e3638dfea8ff60"}, 0x36) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r4, 0xc010640b, &(0x7f0000000040)={0x0, 0x0, 0x4}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000080)={r7, 0x0, r0}) fcntl$F_GET_RW_HINT(r6, 0x40b, &(0x7f0000000100)) ioctl(r5, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet6(0xa, 0x0, 0x0) 12:06:20 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000900)='stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000280)='system.advise\x00'}, 0x30) process_vm_readv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000380)=[{&(0x7f0000000200)="94b39138444755e2df62cb0d78a8e556e2e749999dd1b4", 0x17}], 0x2000000, &(0x7f00000004c0)={[{@nls={'nls', 0x3d, 'iso8859-1'}}, {@errors_continue='errors=continue'}, {@errors_continue='errors=continue'}, {@case_sensitive_no='case_sensitive=no'}]}) sendmsg$rds(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x2, 0x4e22, @rand_addr=0x2000000000000}, 0x10, &(0x7f0000000d00)=[{&(0x7f00000000c0)=""/64, 0x40}, {&(0x7f0000000700)=""/157, 0x9d}, {&(0x7f00000007c0)=""/105, 0x69}, {&(0x7f0000000a40)=""/155, 0x9b}, {&(0x7f0000000b00)=""/220, 0xdc}, {&(0x7f0000000c00)=""/228, 0xe4}], 0x6, 0x0, 0x0, 0x8800}, 0x40041) lstat(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000680)) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:20 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x120) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 12:06:20 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'no\ne'}}]}) 12:06:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) socket$alg(0x26, 0x5, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x400401, 0x0) syz_open_dev$radio(&(0x7f00000003c0)='/dev/radio#\x00', 0x3, 0x2) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80010000}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, r2, 0x8, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x100, @remote, 0x3}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x1b9, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xf}}, 0x1ff}}}}]}, @TIPC_NLA_MEDIA={0x50, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NET={0x44, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x40}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x289}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x10001}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x10}, 0x4010) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2000, 0x0) ioctl$SIOCRSSCAUSE(r3, 0x89e1, &(0x7f0000000040)=0xa3) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 766.440377] hfs: unable to load codepage "no [ 766.440377] e" [ 766.453806] hfs: unable to parse mount options [ 766.458893] hfs: unable to load codepage "none" [ 766.463579] hfs: unable to parse mount options [ 766.500920] kvm: vcpu 0: requested 34784 ns lapic timer period limited to 200000 ns 12:06:20 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000900)='stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000280)='system.advise\x00'}, 0x30) process_vm_readv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000380)=[{&(0x7f0000000200)="94b39138444755e2df62cb0d78a8e556e2e749999dd1b4", 0x17}], 0x2000000, &(0x7f00000004c0)={[{@nls={'nls', 0x3d, 'iso8859-1'}}, {@errors_continue='errors=continue'}, {@errors_continue='errors=continue'}, {@case_sensitive_no='case_sensitive=no'}]}) sendmsg$rds(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x2, 0x4e22, @rand_addr=0x2000000000000}, 0x10, &(0x7f0000000d00)=[{&(0x7f00000000c0)=""/64, 0x40}, {&(0x7f0000000700)=""/157, 0x9d}, {&(0x7f00000007c0)=""/105, 0x69}, {&(0x7f0000000a40)=""/155, 0x9b}, {&(0x7f0000000b00)=""/220, 0xdc}, {&(0x7f0000000c00)=""/228, 0xe4}], 0x6, 0x0, 0x0, 0x8800}, 0x40041) lstat(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000680)) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 766.629571] hfs: unable to load codepage "no [ 766.629571] e" [ 766.636055] hfs: unable to load codepage "none" [ 766.664247] hfs: unable to parse mount options [ 766.678869] hfs: unable to parse mount options 12:06:20 executing program 4: r0 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x3, 0x2) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000100)={0x3, 0x80, 0x7, 0x9ae, 0x80, 0x8000, 0x3f, 0x4, 0x1aa, 0x3, 0x10000000000}, 0xb) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) fchmod(r0, 0x1) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) ioctl$KVM_DIRTY_TLB(r0, 0x4010aeaa, &(0x7f0000000180)={0x4f, 0x10000}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x30280, 0x0) ioctl$NBD_DISCONNECT(r2, 0xab08) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x200, 0x0) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYRES64], 0xfffffd34) recvmsg(r4, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 12:06:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 12:06:20 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0xedc000000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:20 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'no%e'}}]}) 12:06:20 executing program 3: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x45, 0x0) ioctl$KVM_SET_FPU(r0, 0x41a0ae8d, &(0x7f0000000040)={[], 0x5, 0x0, 0x7a6, 0x0, 0x81, 0x0, 0x103000, [], 0x1ff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) [ 766.955630] kvm: vcpu 0: requested 34784 ns lapic timer period limited to 200000 ns 12:06:21 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000900)='stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000280)='system.advise\x00'}, 0x30) process_vm_readv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000380)=[{&(0x7f0000000200)="94b39138444755e2df62cb0d78a8e556e2e749999dd1b4", 0x17}], 0x2000000, &(0x7f00000004c0)={[{@nls={'nls', 0x3d, 'iso8859-1'}}, {@errors_continue='errors=continue'}, {@errors_continue='errors=continue'}, {@case_sensitive_no='case_sensitive=no'}]}) sendmsg$rds(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x2, 0x4e22, @rand_addr=0x2000000000000}, 0x10, &(0x7f0000000d00)=[{&(0x7f00000000c0)=""/64, 0x40}, {&(0x7f0000000700)=""/157, 0x9d}, {&(0x7f00000007c0)=""/105, 0x69}, {&(0x7f0000000a40)=""/155, 0x9b}, {&(0x7f0000000b00)=""/220, 0xdc}, {&(0x7f0000000c00)=""/228, 0xe4}], 0x6, 0x0, 0x0, 0x8800}, 0x40041) lstat(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000680)) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:21 executing program 3: r0 = accept4$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x800) write$binfmt_aout(r0, &(0x7f0000000180)={{0xcc, 0x5cf9a6a1, 0x2, 0x28f, 0x3a5, 0x2, 0x2f5, 0x8}, "bc527219e10348b59b8a07886077d1215010c4c30a16f7756ab8b26953f11f58063a9d", [[], [], []]}, 0x343) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-sse2\x00'}, 0xffffffffffffff7e) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) 12:06:21 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000480)={0x79, 0x0, [0x404]}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000001940)={"a523fb9656eb871ffcd7ffeb51d84e738a55eba841ae487e33cdd921e8a51ce6c924020f0ac3562dd8cdeb31deac16f46da4ac16ee8165bce439eddce671c5b0a1103ea3f86a43cbb78504f6f9c77c2f09dc27632ec6036ee52a87e321e707c0cfe15576c26d52d0334c8d4693e127b3a046a5ed7796c9c5017cfd58ec871ed76369846fea9ebfa2f7f96496abf4ef57ed1ecd930eb9e13396875f01e932804ffe8a34c8fbedd97cdfb3176ec59fbbfd20a6ff17795431c341a35eb0f5f703480a5211cc6a7e2084e4a9b6aedf60b7b8084b00ca2cbed255b4cc4679c967432fea5e95119f9635e94794aab6ef54f290677fa08d0ee2cc8eae468efd02417055d3f3ccc86b629dfb878c4d115c16c75fe352cffa93648cf49577256b5d2faf0634335c97ffff966ae90cbf81250df3613c25d2789c869c9cc95a6e9d364c4c684059c593f9950e66cf81cd9f36d73fade4f0cbb795010364d13ff32c12efd91d0ebb6533700945f2db6113a630bd521eec89a74c46e1733b72d6e4d2ccee3b40f99809a9a4fb5fc2d1c53e1366d455bcbe81893100ab56b2556b55c1a0c5787356b464c3bf7011488e55f587a6d4420d46d69a74ee5bbfbcb0d6cb00aae8c3dfd6dd2e9f76d7a542f20553207b668dce69f1b463ee9166e81bb109f461b8885f15c9e525d72260ccdbd69e3345612158114780b9409ea856cb724faa6ed27ba836b35c10e7c7d43f2fa34f98f16a00f31565e16a213eaf4a7f438c89733ebe6d16328b930fd942bc64d631dd1f2aa1cc2ccdaff2324076c83e1ba4d2a0e40e010c96b42e7a4a76cd7a89ef592b9b3030f62d9fbd565ee5908ab90b42620b61e5d1e08621a31d21003cd12a450461636472fa64a7e1b98778bfb482fb4b4da31b42ee98b10f9c0f4c085d08c37ee2e3a9e4a5aff72a0ab844fcbfa224842c85f6cdfd25829c44760e3859624f891df4824f7d17938ac2dee1412cf3083e1d5ee2d29b63267ccba535409da7bef05d3fa79a3ef037ee609e01ad345ee17f48b5e8510f767de35df4dfb856f7533ad88866c6b01fe345107ba7191a8809e2e014492acf9c4f35cad664198a65c55f884490f4b30b4526324be842c393f336f16bea2bf6c6b917fdb751e12ff689ab4ffa44625a8b2bc1de4e88682abe5ce9d1942792747681ad23c31046d825140987f19a9cf10323c3f50a20f35a6d1dd8ca6758296b4537a0da1a853011b777623c8774b3689897cf9264a7782470847f36a8093f04000000663438ab39d8a777fb3e10cb4a2402a939a98d387087c5ca5fd8fbc4d96ae698b5bb84a0a8484e2b85743e623a033eb5b1889ccfb4b95885bc69d4c1cb819b95e7923e557c9ec9ec10e94d1e1295fc2f256fa095036f6cfc04c414fc57fc72c120614a586089c93741e97a61c46600"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfe2f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) getsockopt$bt_hci(r5, 0x0, 0x3, &(0x7f0000000180)=""/43, &(0x7f00000001c0)=0x2b) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070aaa504da42b41611313045e1f390469ae634a179368f98c0156835029ea489460dd48fd65c7f3f1425fb51119bf10a90151f3107f63b5df2727ca5946c5a5ef39cce3395ec1867ff3c60de9778da1b39eb3e6c74559ffeda72c2419392a3405fdf2468af352cb5cc09193c7434bfb240ff7d5a0e1fbca21413646ab9dbe17b") ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000100)={0x2, 0xa98, 0xfffffffffffffffa, 0x800}) socket$inet6(0xa, 0x0, 0x0) [ 767.143058] hfs: unable to load codepage "none" [ 767.153031] hfs: unable to parse mount options [ 767.162333] hfs: unable to load codepage "no%e" [ 767.167451] hfs: unable to parse mount options 12:06:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x193) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) getresgid(&(0x7f0000000080)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) fchown(r0, r1, r2) [ 767.346175] hfs: unable to load codepage "none" [ 767.352213] hfs: unable to parse mount options [ 767.357314] hfs: unable to load codepage "no%e" [ 767.362216] hfs: unable to parse mount options 12:06:21 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000900)='stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000280)='system.advise\x00'}, 0x30) process_vm_readv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000380)=[{&(0x7f0000000200)="94b39138444755e2df62cb0d78a8e556e2e749999dd1b4", 0x17}], 0x2000000, &(0x7f00000004c0)={[{@nls={'nls', 0x3d, 'iso8859-1'}}, {@errors_continue='errors=continue'}, {@errors_continue='errors=continue'}, {@case_sensitive_no='case_sensitive=no'}]}) sendmsg$rds(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x2, 0x4e22, @rand_addr=0x2000000000000}, 0x10, &(0x7f0000000d00)=[{&(0x7f00000000c0)=""/64, 0x40}, {&(0x7f0000000700)=""/157, 0x9d}, {&(0x7f00000007c0)=""/105, 0x69}, {&(0x7f0000000a40)=""/155, 0x9b}, {&(0x7f0000000b00)=""/220, 0xdc}, {&(0x7f0000000c00)=""/228, 0xe4}], 0x6, 0x0, 0x0, 0x8800}, 0x40041) lstat(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000680)) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:21 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'non\n'}}]}) 12:06:21 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x4000000000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYRES64], 0xfffffd34) recvmsg(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) sync() r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20000, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000100)='veno\x00', 0x5) 12:06:21 executing program 3: openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x5, 0x100) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) 12:06:21 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000900)='stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000280)='system.advise\x00'}, 0x30) process_vm_readv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000380)=[{&(0x7f0000000200)="94b39138444755e2df62cb0d78a8e556e2e749999dd1b4", 0x17}], 0x2000000, &(0x7f00000004c0)={[{@nls={'nls', 0x3d, 'iso8859-1'}}, {@errors_continue='errors=continue'}, {@errors_continue='errors=continue'}, {@case_sensitive_no='case_sensitive=no'}]}) sendmsg$rds(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x2, 0x4e22, @rand_addr=0x2000000000000}, 0x10, &(0x7f0000000d00)=[{&(0x7f00000000c0)=""/64, 0x40}, {&(0x7f0000000700)=""/157, 0x9d}, {&(0x7f00000007c0)=""/105, 0x69}, {&(0x7f0000000a40)=""/155, 0x9b}, {&(0x7f0000000b00)=""/220, 0xdc}, {&(0x7f0000000c00)=""/228, 0xe4}], 0x6, 0x0, 0x0, 0x8800}, 0x40041) lstat(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000680)) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 767.755628] hfs: unable to load codepage "non [ 767.755628] " [ 767.782577] hfs: unable to parse mount options [ 767.793119] hfs: unable to load codepage "none" [ 767.798703] hfs: unable to parse mount options 12:06:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 12:06:21 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 767.943711] hfs: unable to load codepage "non [ 767.943711] " [ 767.974642] hfs: unable to parse mount options 12:06:22 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'non%'}}]}) 12:06:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x400001, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)) ioctl$CAPI_REGISTER(r1, 0x400c4301, &(0x7f00000000c0)={0x0, 0x9, 0x200}) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000340)={"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"}) [ 768.194083] hfs: unable to load codepage "none" [ 768.205504] hfs: unable to parse mount options [ 768.245084] hfs: unable to load codepage "non%" [ 768.256754] hfs: unable to parse mount options [ 768.333895] hfs: unable to load codepage "none" [ 768.346550] hfs: unable to parse mount options 12:06:22 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000480)={0x79, 0x0, [0x404]}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000001940)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfe2f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f0000000100)) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet6(0xa, 0x0, 0x0) 12:06:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x7) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40080, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000000040)={0x40000000, 0x103, "de192cd3a9684deaa030d5aef7517c35e52ea66b170a165c3fc3431455ef0914", 0x5, 0xbec, 0x8, 0x70, 0x60, 0x77648c2e, 0x16, 0x8000, [0x3, 0x1, 0x8]}) ioctl$EXT4_IOC_RESIZE_FS(r1, 0x40086610, &(0x7f0000000140)) socket$alg(0x26, 0x5, 0x0) 12:06:22 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000900)='stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000280)='system.advise\x00'}, 0x30) process_vm_readv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000380)=[{&(0x7f0000000200)="94b39138444755e2df62cb0d78a8e556e2e749999dd1b4", 0x17}], 0x2000000, &(0x7f00000004c0)={[{@nls={'nls', 0x3d, 'iso8859-1'}}, {@errors_continue='errors=continue'}, {@errors_continue='errors=continue'}, {@case_sensitive_no='case_sensitive=no'}]}) sendmsg$rds(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x2, 0x4e22, @rand_addr=0x2000000000000}, 0x10, &(0x7f0000000d00)=[{&(0x7f00000000c0)=""/64, 0x40}, {&(0x7f0000000700)=""/157, 0x9d}, {&(0x7f00000007c0)=""/105, 0x69}, {&(0x7f0000000a40)=""/155, 0x9b}, {&(0x7f0000000b00)=""/220, 0xdc}, {&(0x7f0000000c00)=""/228, 0xe4}], 0x6, 0x0, 0x0, 0x8800}, 0x40041) lstat(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000680)) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:22 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}, 0x33}]}) 12:06:22 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 768.600935] hfs: unable to load codepage "none3" [ 768.623257] hfs: unable to parse mount options [ 768.649522] hfs: unable to load codepage "none" [ 768.654230] hfs: unable to parse mount options 12:06:22 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x4000, 0x0) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f00000014c0)={0x9, 0x0, [{0x5, 0x2, 0x0, 0x0, @adapter={0x1, 0x5, 0x9, 0xfffffffffffffff8, 0x8}}, {0x2, 0x6, 0x0, 0x0, @adapter={0x1, 0x8afc, 0x9, 0x1, 0x1}}, {0xffff, 0x0, 0x0, 0x0, @irqchip={0x2}}, {0x3, 0x7, 0x0, 0x0, @irqchip={0x20, 0x24d}}, {0x0, 0x7, 0x0, 0x0, @msi={0x100000000, 0xffffffff, 0x8001}}, {0x2, 0x7, 0x0, 0x0, @sint={0x8001, 0x9}}, {0x5, 0x4, 0x0, 0x0, @adapter={0x2, 0x8001, 0x0, 0x81, 0x9}}, {0x0, 0x2, 0x0, 0x0, @adapter={0x10001, 0xffffffff, 0x8001, 0x200, 0x8}}, {0x7, 0x2, 0x0, 0x0, @msi={0x1, 0xfff, 0x6}}]}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000001680)={0x6, 0x0, [{0x7f, 0x2, 0x0, 0x0, @irqchip={0x6}}, {0x4, 0x4, 0x0, 0x0, @irqchip={0x1, 0x8}}, {0xffff, 0x3, 0x0, 0x0, @msi={0x8000, 0x8, 0xcc}}, {0x100000000, 0x4, 0x0, 0x0, @sint={0x5, 0x4}}, {0x3, 0x0, 0x0, 0x0, @irqchip={0x7fff, 0xfffffffffffffeff}}, {0x1, 0x6, 0x0, 0x0, @adapter={0x3e, 0x20, 0x3, 0x1, 0xc5b}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYRES64], 0xfffffd34) recvmsg(r3, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 12:06:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000040)=0x1c, 0x80800) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x8000, 0x2, [0xcc, 0x0]}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={r2, 0x4}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000180)={r2, 0xfff}, 0x8) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0xa7, 0xfe925055012ed8bc) write$P9_RWALK(r3, &(0x7f0000000200)={0x71, 0x6f, 0x1, {0x8, [{0x44, 0x3}, {0x48, 0x0, 0x4}, {0x22, 0x2}, {0x40, 0x2, 0x8}, {0x0, 0x4, 0x5}, {0xc0, 0x4, 0x4}, {0x10, 0x0, 0x3}, {0x8, 0x1, 0x5}]}}, 0x71) 12:06:22 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000900)='stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000280)='system.advise\x00'}, 0x30) process_vm_readv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000380)=[{&(0x7f0000000200)="94b39138444755e2df62cb0d78a8e556e2e749999dd1b4", 0x17}], 0x2000000, &(0x7f00000004c0)={[{@nls={'nls', 0x3d, 'iso8859-1'}}, {@errors_continue='errors=continue'}, {@errors_continue='errors=continue'}, {@case_sensitive_no='case_sensitive=no'}]}) sendmsg$rds(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x2, 0x4e22, @rand_addr=0x2000000000000}, 0x10, &(0x7f0000000d00)=[{&(0x7f00000000c0)=""/64, 0x40}, {&(0x7f0000000700)=""/157, 0x9d}, {&(0x7f00000007c0)=""/105, 0x69}, {&(0x7f0000000a40)=""/155, 0x9b}, {&(0x7f0000000b00)=""/220, 0xdc}, {&(0x7f0000000c00)=""/228, 0xe4}], 0x6, 0x0, 0x0, 0x8800}, 0x40041) lstat(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000680)) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 768.801075] hfs: unable to load codepage "none3" [ 768.813993] hfs: unable to parse mount options [ 768.833424] hfs: unable to load codepage "none" [ 768.853959] hfs: unable to parse mount options 12:06:22 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x2}) 12:06:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) arch_prctl$ARCH_SET_GS(0x1001, 0x4) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x102, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000340)={0x0, {{0xa, 0x4e23, 0x100, @dev={0xfe, 0x80, [], 0x2b}, 0x192}}, 0x0, 0x5, [{{0xa, 0x8, 0x5, @mcast1, 0x5}}, {{0xa, 0x4e20, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xfffffffffffffffd}}, {{0xa, 0x4e21, 0x26cc, @rand_addr="d6fe3a71f5758e6b82c3e2931b7c854b", 0x2}}, {{0xa, 0x4e22, 0x4, @empty, 0x201}}, {{0xa, 0x4e21, 0xdc, @ipv4={[], [], @empty}, 0x7}}]}, 0x310) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0xfffffffffffffeba) 12:06:22 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 769.063275] hfs: unable to load codepage "none" [ 769.069166] hfs: unable to parse mount options [ 769.224190] hfs: unable to load codepage "none" [ 769.230015] hfs: unable to parse mount options [ 769.318048] hfs: unable to load codepage "none" [ 769.323254] hfs: unable to parse mount options [ 769.438517] kvm: vcpu 0: requested 34784 ns lapic timer period limited to 200000 ns [ 769.491460] kvm: vcpu 0: requested 34784 ns lapic timer period limited to 200000 ns 12:06:23 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x80, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000480)={0x79, 0x0, [0x404]}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000001940)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfe2f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f0000000100)) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet6(0xa, 0x0, 0x0) 12:06:23 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000900)='stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000280)='system.advise\x00'}, 0x30) process_vm_readv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000380)=[{&(0x7f0000000200)="94b39138444755e2df62cb0d78a8e556e2e749999dd1b4", 0x17}], 0x2000000, &(0x7f00000004c0)={[{@nls={'nls', 0x3d, 'iso8859-1'}}, {@errors_continue='errors=continue'}, {@errors_continue='errors=continue'}, {@case_sensitive_no='case_sensitive=no'}]}) sendmsg$rds(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x2, 0x4e22, @rand_addr=0x2000000000000}, 0x10, &(0x7f0000000d00)=[{&(0x7f00000000c0)=""/64, 0x40}, {&(0x7f0000000700)=""/157, 0x9d}, {&(0x7f00000007c0)=""/105, 0x69}, {&(0x7f0000000a40)=""/155, 0x9b}, {&(0x7f0000000b00)=""/220, 0xdc}, {&(0x7f0000000c00)=""/228, 0xe4}], 0x6, 0x0, 0x0, 0x8800}, 0x40041) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:23 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:23 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x3}) 12:06:23 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x2000, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2080a29}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x68, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2c}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x38}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x11, 0x2}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}]}, 0x68}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3, 0x10000) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f00000000c0)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f0000000040)=[{}, {}, {}, {}, {}], 0x0, [{}, {}]}, 0x98) [ 769.652302] hfs: unable to load codepage "none" [ 769.657583] hfs: unable to parse mount options [ 769.671343] hfs: unable to load codepage "none" [ 769.678334] hfs: unable to parse mount options 12:06:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC, @ANYRESDEC=r0], 0x28) recvmsg(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 12:06:23 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000480)={0x79, 0x0, [0x404]}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000001940)={"a523fb9656eb871ffcd7ffeb51d84e738a55eba841ae487e33cdd921e8a51ce6c924020f0ac3562dd8cdeb31deac16f46da4ac16ee8165bce439eddce671c5b0a1103ea3f86a43cbb78504f6f9c77c2f09dc27632ec6036ee52a87e321e707c0cfe15576c26d52d0334c8d4693e127b3a046a5ed7796c9c5017cfd58ec871ed76369846fea9ebfa2f7f96496abf4ef57ed1ecd930eb9e13396875f01e932804ffe8a34c8fbedd97cdfb3176ec59fbbfd20a6ff17795431c341a35eb0f5f703480a5211cc6a7e2084e4a9b6aedf60b7b8084b00ca2cbed255b4cc4679c967432fea5e95119f9635e94794aab6ef54f290677fa08d0ee2cc8eae468efd02417055d3f3ccc86b629dfb878c4d115c16c75fe352cffa93648cf49577256b5d2faf0634335c97ffff966ae90cbf81250df3613c25d2789c869c9cc95a6e9d364c4c684059c593f9950e66cf81cd9f36d73fade4f0cbb795010364d13ff32c12efd91d0ebb6533700945f2db6113a630bd521eec89a74c46e1733b72d6e4d2ccee3b40f99809a9a4fb5fc2d1c53e1366d455bcbe81893100ab56b2556b55c1a0c5787356b464c3bf7011488e55f587a6d4420d46d69a74ee5bbfbcb0d6cb00aae8c3dfd6dd2e9f76d7a542f20553207b668dce69f1b463ee9166e81bb109f461b8885f15c9e525d72260ccdbd69e3345612158114780b9409ea856cb724faa6ed27ba836b35c10e7c7d43f2fa34f98f16a00f31565e16a213eaf4a7f438c89733ebe6d16328b930fd942bc64d631dd1f2aa1cc2ccdaff2324076c83e1ba4d2a0e40e010c96b42e7a4a76cd7a89ef592b9b3030f62d9fbd565ee5908ab90b42620b61e5d1e08621a31d21003cd12a450461636472fa64a7e1b98778bfb482fb4b4da31b42ee98b10f9c0f4c085d08c37ee2e3a9e4a5aff72a0ab844fcbfa224842c85f6cdfd25829c44760e3859624f891df4824f7d17938ac2dee1412cf3083e1d5ee2d29b63267ccba535409da7bef05d3fa79a3ef037ee609e01ad345ee17f48b5e8510f767de35df4dfb856f7533ad88866c6b01fe345107ba7191a8809e2e014492acf9c4f35cad664198a65c55f884490f4b30b4526324be842c393f336f16bea2bf6c6b917fdb751e12ff689ab4ffa44625a8b2bc1de4e88682abe5ce9d1942792747681ad23c31046d825140987f19a9cf10323c3f50a20f35a6d1dd8ca6758296b4537a0da1a853011b777623c8774b3689897cf9264a7782470847f36a8093f04000000663438ab39d8a777fb3e10cb4a2402a939a98d387087c5ca5fd8fbc4d96ae698b5bb84a0a8484e2b85743e623a033eb5b1889ccfb4b95885bc69d4c1cb819b95e7923e557c9ec9ec10e94d1e1295fc2f256fa095036f6cfc04c414fc57fc72c120614a586089c93741e97a61c46600"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfe2f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f0000000100)) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x4) socket$inet6(0xa, 0x0, 0x0) 12:06:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = socket(0x3, 0xa, 0x80) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f0000000000)=0x1) 12:06:23 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000900)='stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000280)='system.advise\x00'}, 0x30) process_vm_readv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000380)=[{&(0x7f0000000200)="94b39138444755e2df62cb0d78a8e556e2e749999dd1b4", 0x17}], 0x2000000, &(0x7f00000004c0)={[{@nls={'nls', 0x3d, 'iso8859-1'}}, {@errors_continue='errors=continue'}, {@errors_continue='errors=continue'}, {@case_sensitive_no='case_sensitive=no'}]}) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 769.782803] hfs: unable to load codepage "none" [ 769.787974] hfs: unable to load codepage "none" [ 769.792665] hfs: unable to parse mount options [ 769.807334] hfs: unable to parse mount options 12:06:23 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x4}) 12:06:23 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) fchmod(r0, 0xc3) r1 = accept4(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000080)=0x80, 0x80000) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f00000000c0)=ANY=[@ANYBLOB="68696c74657200000000000000000000000000000000000000000000000000002a0000004428d58e18621f93250ea2b5454bfeb189d3f87d931e36d5294cd958a9ff2390674fe4480f21f95ebe81"], &(0x7f0000000140)=0x4e) 12:06:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = socket$kcm(0x2b, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = accept$alg(r0, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0xf4, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0x3e3, @loopback, 0x400}, @in={0x2, 0x4e20, @rand_addr=0x8001}, @in6={0xa, 0x4e22, 0x8, @loopback}, @in6={0xa, 0x4e24, 0x7ff, @local, 0x51}, @in6={0xa, 0x4e20, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x92}, @in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e24, 0x9a9f, @remote, 0x1}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x22}}, @in6={0xa, 0x4e20, 0xba, @mcast1, 0x800000}, @in6={0xa, 0x4e20, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x80}]}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f00000012c0)={r4, 0xfffffffffffffff9, 0x5, 0x8000, 0xfffffffffffffc00, 0x1f}, &(0x7f0000001300)=0x14) write$binfmt_script(r2, &(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYRES64], 0xfffffd34) recvmsg(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 12:06:24 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000900)='stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000280)='system.advise\x00'}, 0x30) process_vm_readv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000380)=[{&(0x7f0000000200)="94b39138444755e2df62cb0d78a8e556e2e749999dd1b4", 0x17}], 0x2000000, &(0x7f00000004c0)={[{@nls={'nls', 0x3d, 'iso8859-1'}}, {@errors_continue='errors=continue'}, {@errors_continue='errors=continue'}, {@case_sensitive_no='case_sensitive=no'}]}) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) bind$netlink(r1, &(0x7f00000000c0)={0x10, 0x0, 0x25dfdbfb, 0x500000}, 0xc) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x34a) [ 770.264843] hfs: unable to load codepage "none" [ 770.274450] hfs: unable to parse mount options [ 770.303228] hfs: unable to load codepage "none" [ 770.312552] hfs: unable to parse mount options 12:06:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) r1 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x400000) ioctl$BLKRRPART(r1, 0x125f, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x0, 0x2) clock_gettime(0x0, &(0x7f00000007c0)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000800)={0xde51, 0xb, 0x4, 0x800, {r3, r4/1000+30000}, {0x1, 0x2, 0xfffffffffffffffa, 0xfffffffffffffffe, 0x5, 0x200, "0e378be9"}, 0x49a, 0x4, @userptr=0xee3, 0x4}) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000280)='team_slave_1\x00') ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r2, 0xc040564b, &(0x7f0000000240)={0x1, 0x0, 0x4001, 0x0, 0x3, {0x3, 0x8}, 0x1}) sendfile(r0, r0, &(0x7f0000000180), 0xa000000000000) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0xfd, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x1f, &(0x7f0000001d80)={@loopback, 0x0}, &(0x7f0000001dc0)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001e00)={'ifb0\x00', r6}) ioctl$sock_inet_SIOCSIFPFLAGS(r5, 0x8934, &(0x7f00000000c0)={'lapb0\x00', 0xfff}) write$uinput_user_dev(r5, &(0x7f0000000340)={'syz1\x00', {0xfffffffffffffc00, 0x5, 0x200, 0x81}, 0x37, [0xfffffffffffffffa, 0x6, 0xfffffffffffffff9, 0x6, 0x9, 0x8, 0x0, 0x8001, 0x7fff, 0x10001, 0x80000001, 0x6, 0x1, 0x2, 0x80000001, 0x2, 0x7, 0x0, 0x0, 0x8000, 0x7ff, 0x1, 0x73, 0x3, 0x400, 0x6, 0x2, 0x400, 0x5, 0x4, 0x7, 0x0, 0x6cf, 0x7f, 0x200, 0x3ff, 0x9, 0x4, 0x2, 0x9, 0x100, 0x6, 0xd77, 0x3, 0x8a0b, 0x0, 0x2, 0x1, 0x80000001, 0x8000, 0x3, 0x9, 0x7fff, 0x0, 0x5, 0x7d8e, 0x46c2e1ae, 0x8, 0x7, 0x4, 0x4, 0x2, 0x400, 0x3], [0x881, 0x3, 0x7, 0x5e, 0x7ff, 0x6, 0x100000000, 0xffffffffffffffff, 0x8001, 0x1, 0xff, 0x9, 0x179253fb, 0xc9, 0x6, 0x4, 0x8, 0xbcc, 0x2be4, 0x7fff, 0x361, 0xb2, 0x3, 0x0, 0x80000001, 0x2, 0x204fb8dd, 0x1, 0xed5a, 0xffff, 0x6, 0x0, 0x2, 0x4, 0x3f, 0x0, 0x3, 0x7f, 0x4, 0x9, 0x0, 0x8001, 0x7ff, 0x6, 0x9, 0x1, 0x4, 0x9, 0x0, 0x1, 0x1, 0x7, 0x3, 0x1, 0x8, 0xffffffffffffffeb, 0xe25b, 0x74a7, 0x100000000, 0x0, 0x9, 0x8000, 0xd53, 0x4], [0x6, 0x5, 0x1000, 0xffffffffffffff11, 0x7, 0x3, 0x3, 0x200, 0x3, 0x9, 0xb25, 0x0, 0xfff, 0x4, 0x8, 0x5, 0x0, 0xdc0, 0x68b, 0x44e, 0x7, 0xdc5, 0xff, 0x1, 0x1, 0x3, 0x2, 0x7f, 0x7f, 0x40, 0x200000000000000, 0x8, 0x1ff, 0x0, 0x6e82714a, 0x4, 0x0, 0x3, 0x1000, 0x2, 0x7, 0x584, 0x401, 0x401, 0x0, 0xfff, 0x81, 0x9, 0x3ff, 0x7, 0x9, 0xff, 0x3, 0x3, 0x1, 0x63305765, 0x10000, 0x20, 0x1, 0x4, 0x8, 0x5, 0xffff, 0x6], [0x1ff, 0x8, 0x7, 0x5, 0x10001, 0x1000, 0xf5ed, 0x8, 0x1f, 0x5, 0x0, 0x1, 0x3, 0xbb32, 0x0, 0x1, 0x0, 0x6, 0x1, 0x3ff, 0x773f4457, 0x6, 0x938, 0x5, 0x1, 0x81, 0x1f, 0x5, 0xad9, 0x7, 0x1000, 0x1, 0xffffffff00000000, 0x3, 0x0, 0x5, 0x4000, 0x24, 0x400, 0x0, 0x10001, 0x0, 0x1, 0xfffffffffffff801, 0x3, 0xc0000000000, 0x5, 0x2, 0x7, 0xfff, 0x3, 0x6, 0x3, 0x0, 0x3ff, 0x4, 0x400, 0x0, 0xbf, 0x3, 0x2, 0x4, 0x0, 0x9]}, 0x45c) accept$nfc_llcp(r5, 0x0, &(0x7f0000000040)) recvfrom$inet(r5, &(0x7f0000000940)=""/150, 0x96, 0x100, &(0x7f0000000a00)={0x2, 0x4e23, @remote}, 0x10) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000080)) ioctl$VT_OPENQRY(r5, 0x5600, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$cgroup_int(r2, &(0x7f00000008c0)=0x3f, 0x9) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r5, 0x84, 0x21, &(0x7f0000000880), &(0x7f0000000900)=0x4) mknodat(r5, &(0x7f00000001c0)='./file0\x00', 0xe00c, 0x8003) [ 770.404657] hfs: unable to load codepage "none" [ 770.409779] hfs: unable to parse mount options 12:06:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000080)={0x0, 0x7fff, 0x4, 0x6, 0xff, 0x8b6c, 0x1, 0x67, 0x0}, &(0x7f0000000240)=0x20) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000280)={r2, 0xfffffffffffffffb}, &(0x7f0000000340)=0x8) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x140, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000200)={@mcast1, 0x18, r4}) 12:06:24 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x5}) [ 770.614517] hfs: unable to load codepage "none" [ 770.652935] hfs: unable to parse mount options [ 770.766718] hfs: unable to load codepage "none" [ 770.771771] hfs: unable to parse mount options 12:06:24 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000480)={0x79, 0x0, [0x404]}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r2, r0, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xffffff00, 0x0, 0x0, 0xfd8b) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000001940)={"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"}) getsockname(r0, &(0x7f0000000040)=@x25, &(0x7f0000000180)=0x80) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfe2f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f0000000100)) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) socket$inet6(0xa, 0x0, 0x0) 12:06:24 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000000)={0x7fffffff, 0x3, 0x7, 0x1, 0x0}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080)={0x9, 0x7f, 0x4, 0x10000, 0x6, 0x10000, 0x1, 0x80, r1}, 0x20) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 12:06:24 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000900)='stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000280)='system.advise\x00'}, 0x30) process_vm_readv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:24 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x6}) 12:06:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x90) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x400, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) gettid() stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_CREATE_OPEN(r1, &(0x7f00000001c0)={0xa0, 0x0, 0x5, {{0x1, 0x0, 0x9, 0x7, 0x7, 0xffff, {0x0, 0x7fffffff, 0x10001, 0x1, 0x6, 0x8, 0x8, 0x0, 0x9, 0x5, 0x6, r2, r3, 0x8, 0xfffffffffffffffb}}, {0x0, 0x2}}}, 0xa0) [ 770.923994] hfs: unable to load codepage "none" [ 770.929107] hfs: unable to parse mount options 12:06:25 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000900)='stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000280)='system.advise\x00'}, 0x30) process_vm_readv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) socket$kcm(0x2b, 0x1, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x20000000, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x400003, 0x84) modify_ldt$write2(0x11, &(0x7f0000000100)={0xffff, 0x100000, 0x400, 0xffff, 0x3ff, 0x100, 0x2, 0x8, 0x1, 0x9}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1000003) r3 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[@ANYRESDEC, @ANYRES64], 0x1c) recvmsg(r3, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 12:06:25 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x1ff, 0x100) ioctl$VIDIOC_S_AUDOUT(r1, 0x40345632, &(0x7f00000000c0)={0x5, "1a44069d4703904461900ef10ad891dd0480c2e8106f3d146bf23d030b6d8f21", 0x1, 0x1}) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) syz_open_procfs(r2, &(0x7f0000000040)='net/ip_tables_names\x00') [ 771.163281] hfs: unable to load codepage "none" [ 771.168488] hfs: unable to parse mount options 12:06:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = accept$alg(r0, 0x0, 0x0) r3 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000012c0)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000100)=0xe8) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x40000, &(0x7f00000014c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@uname={'uname', 0x3d, 'skcipher\x00'}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '-'}}, {@loose='loose'}], [{@defcontext={'defcontext', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, r4}}, {@appraise_type='appraise_type=imasig'}]}}) write$binfmt_script(r2, &(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYRES64], 0xfffffd34) recvmsg(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 12:06:25 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000900)='stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000280)='system.advise\x00'}, 0x30) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 771.389643] hfs: unable to load codepage "none" [ 771.394550] hfs: unable to parse mount options 12:06:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0xe248114719f0e5f9) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x43) 12:06:25 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x7}) 12:06:25 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYPTR=&(0x7f0000000000)=ANY=[@ANYRESOCT=r2]], 0x1c) recvmsg(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x34000}], 0x1, &(0x7f0000001400)=""/123, 0x7b}, 0x0) 12:06:25 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000480)={0x79, 0x0, [0x404]}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000001940)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfe2f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f0000000100)) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet6(0xa, 0x0, 0x0) 12:06:25 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000900)='stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000280)='system.advise\x00'}, 0x30) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 771.908169] hfs: unable to load codepage "none" [ 771.913155] hfs: unable to parse mount options [ 771.935800] hfs: unable to load codepage "none" 12:06:25 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000900)='stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000280)='system.advise\x00'}, 0x30) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 771.960904] hfs: unable to parse mount options 12:06:25 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000900)='stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000280)='system.advise\x00'}, 0x30) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x3, {0x1, 0x0, 0x4}}, 0x10) bind$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x6, {0x0, 0xffffffffffffc1f2, 0x8001, 0x5, 0x101, 0x1}, 0x9, 0x101}, 0xe) [ 771.983599] hfs: unable to load codepage "none" [ 771.988777] hfs: unable to parse mount options 12:06:26 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0xa}) 12:06:26 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x1a0f000000000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:26 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000900)='stat\x00') process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80000, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x3f, &(0x7f0000000340)=""/4096, &(0x7f0000000040)=0x1000) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 12:06:26 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000900)='stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000280)='system.advise\x00'}, 0x30) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:26 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 772.296627] hfs: unable to load codepage "none" [ 772.303966] hfs: unable to parse mount options [ 772.331045] hfs: unable to load codepage "none" [ 772.336118] hfs: unable to parse mount options 12:06:26 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x1f00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 772.423812] hfs: unable to load codepage "none" [ 772.439371] hfs: unable to parse mount options [ 772.644649] hfs: unable to load codepage "none" [ 772.649875] hfs: unable to parse mount options 12:06:26 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = dup(r0) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000001380)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700000000000000236fbcadb802ce059ec2321c56aa61de93167cd7500456bb0c", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xe8) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000001500)="0e7e296a07f11a9172b8441dc4e800d35374f21049fc83d7857dc4050a6daf864a07fa20e4f171af4c4ebf10e6313bcc3cdbc283fff9c02c0cff2cdc0b3d634b8f865b9ba445dbf398800ce6ed5eb6b341db79213eff41109a1975ba8caa77b3417baf3e10a1c33db00b08934af4057fe55c6a", 0x73) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2000, 0x0) execve(&(0x7f00000000c0)='.\x00', &(0x7f0000000180)=[&(0x7f0000000100)=':&vboxnet0{$\x00', &(0x7f0000000140)='\\vmnet1/nodev\x00'], &(0x7f00000014c0)=[&(0x7f00000001c0)='/dev/autofs\x00', &(0x7f0000000200)='K\x00', &(0x7f0000000240)='filter\x00', &(0x7f0000000280)='-proc\x00']) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000340)={'filter\x00', 0x1000, "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"}, &(0x7f0000000040)=0x1024) 12:06:26 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x300}) 12:06:26 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:26 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x100004000020040, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x4, {{0x2, 0x4e23, @multicast2}}}, 0x88) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000480)={0x79, 0x0, [0x404]}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@initdev, @in6=@ipv4={[], [], @loopback}}}, {{@in6=@empty}, 0x0, @in6=@empty}}, &(0x7f00000003c0)=0xe8) fstat(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_xen(&(0x7f0000000180)='%wlan0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x40000, &(0x7f0000000700)={'trans=xen,', {[{@dfltuid={'dfltuid', 0x3d, r4}}, {@cache_mmap='cache=mmap'}, {@version_L='version=9p2000.L'}], [{@obj_type={'obj_type', 0x3d, 'cache=mmap'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'cpusetuser-$vboxnet1'}}, {@smackfsroot={'smackfsroot', 0x3d, 'cpusetsystemmime_typekeyring/]{ppp1'}}, {@permit_directio='permit_directio'}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/bus/usb/00#/00#\x00'}}, {@euid_gt={'euid>', r5}}]}}) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000001940)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfe2f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) fcntl$F_GET_RW_HINT(r7, 0x40b, &(0x7f0000000100)) ioctl(r6, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet6(0xa, 0x0, 0x0) 12:06:26 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000900)='stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000280)='system.advise\x00'}, 0x30) process_vm_readv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:26 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000100)=[@in6={0xa, 0x4e21, 0x2, @rand_addr="001953dc9b92a37db0d0efffb0a7ca74", 0xee2}, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e20, 0x80000001, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xb1b}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x68) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) [ 772.959768] hfs: unable to load codepage "none" [ 772.978721] hfs: unable to parse mount options 12:06:27 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x1, 0x101002) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f00000000c0)={0x0, 0x7fffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x20040) ioctl$EVIOCGSW(r2, 0x8040451b, &(0x7f0000000040)=""/43) [ 773.023944] hfs: unable to load codepage "none" [ 773.035381] hfs: unable to parse mount options 12:06:27 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000900)='stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000280)='system.advise\x00'}, 0x30) process_vm_readv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 773.094620] hfs: unable to load codepage "none" [ 773.099336] hfs: unable to parse mount options 12:06:27 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:27 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x2010000000000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:27 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x500}) 12:06:27 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000900)='stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000280)='system.advise\x00'}, 0x30) process_vm_readv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x101, 0x2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x0, 0x10000) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000040)={0x9, 0x2, 0x5, 0x8}, 0x6) 12:06:27 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 773.412683] hfs: unable to load codepage "none" [ 773.427691] hfs: unable to parse mount options [ 773.501790] hfs: unable to load codepage "none" [ 773.516586] hfs: unable to parse mount options 12:06:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x14a) [ 773.576368] hfs: unable to load codepage "none" [ 773.590167] hfs: unable to parse mount options [ 773.643114] hfs: unable to load codepage "none" [ 773.648447] hfs: unable to parse mount options 12:06:27 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000480)={0x79, 0x0, [0x404]}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) timerfd_gettime(r0, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000001940)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfe2f) unshare(0xc000000) r4 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x8c2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x5}) mq_timedreceive(r4, &(0x7f0000000100)=""/74, 0x4a, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000000)=""/180, &(0x7f0000000180)=0xb4) r6 = syz_open_dev$usb(&(0x7f0000000900)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) fcntl$F_GET_RW_HINT(r6, 0x40b, &(0x7f0000000100)) accept$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) r8 = getuid() setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000280)={{{@in=@dev={0xac, 0x14, 0x14, 0x1b}, @in6=@empty, 0x100000001, 0x8, 0x4e24, 0x0, 0xa, 0xa0, 0xa0, 0xbf, r7, r8}, {0x401, 0x0, 0x7, 0x8, 0x500000000000000, 0x1db2, 0x20, 0xc0000}, {0x3ac3, 0x3, 0x65, 0xb5e2}, 0x5, 0x0, 0x0, 0x1, 0x2, 0x3}, {{@in6=@remote, 0x4d6, 0xff}, 0xa, @in=@broadcast, 0x34ff, 0x7, 0x3, 0x7ff, 0x0, 0xffffffff, 0x5384}}, 0xe8) bind$tipc(r0, &(0x7f00000001c0)=@name={0x1e, 0x2, 0x1, {{0x1, 0x2}, 0x3}}, 0x10) ioctl(r5, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$inet6_dccp_int(r6, 0x21, 0x10, &(0x7f00000000c0)=0xffff, 0x4) socket$inet6(0xa, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000380)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0x2, 0x4, &(0x7f0000000700)=[{&(0x7f0000000400)="b87fc35166b78bcc16100b8320541406a1366dd4d348a348a5570d1d92e2499babb8cca300751bb2348da658ab9b1a4d4ce8fc136c4b858e63f662c00b7c4578599d02e7f0db9aa9b6259eb47299b5", 0x4f, 0x7fff}, {&(0x7f0000000500)="fd60a6d3c3fd851748d81749ecad9451c3ed6aac2a8d170bad4bd98f87fca1c452a988b007e335ed83b1805b6478fa7f0c841b1ae2250744dc7e7af2e96d826cea0d437289526d125efef8661a19010b51ac85487bd5aa0f26935acdae26ccb22c04491785899457967b74d7", 0x6c, 0xb692}, {&(0x7f0000000580)="9be48e6ad5689129055511b396e90786f41679db8470943be8281b7a4865c1782801f4fa7d54e8a3ccd64cf011e5ba12a662709292a38406479cd8fe2884011cb78bb78f1c3bec346c6045ca53095300ae9d427c8ae24b1fe07d558b0b1602fdd13a952eaf2808c6bd1e8e27067ea882a6a2f53dfa114038abe34717245e9ab819dc67fc5eb723140208a61dd84500caaec5508909e36543a1f5da253e43f4c0f7c2791bcfaafae014e323d2b77958", 0xaf, 0x4e2}, {&(0x7f0000000640)="1968e1008491237ce5472a1301a99f91ef7c42271e1a6d8db595cfb5e33b98695cfebb584ce6804b4c362c1b7589d77bb802e20525afdbcaacf93bf53b2fb549a8f1f3748c1d25f1f84b60fe67815eeec21d46539f99e55d266553898754653fcf0b79e24dc01dcd192f2ec7a5beec01a62a2dbb9bee1e39f52bede49d0c6ca65344b3b76ef0aa80a46a9a7e60173a479cbc42e831cb3b19777541", 0x9b, 0x10000}], 0x80000, &(0x7f0000000780)=ANY=[@ANYBLOB='nodots,obj_type=userselfsystem(GPL/.ppp0,pcr=00000000000000000009,slakfsdef=,mask=MAY_EXEC,uid>', @ANYRESDEC=r8, @ANYBLOB=',defcontext=staff_u,smackfsdef=/dev/kvm\x00,subj_role=/dev/bus/usb/00#/00#\x00,hash,\x00']) 12:06:27 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000900)='stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000280)='system.advise\x00'}, 0x30) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:27 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:27 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x2, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000)=0x8) 12:06:27 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x600}) [ 774.015548] hfs: unable to load codepage "none" [ 774.031066] hfs: unable to parse mount options 12:06:28 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 774.079346] hfs: unable to load codepage "none" [ 774.086810] hfs: unable to parse mount options 12:06:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(blowfish-asm)\x00'}, 0xffffffffffffff66) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="a8c2be85d2ab228a5b6b90e3d12fbd7cd1fae8a5ceab7ec5d22108cf64141d19361201f2b8276af4d1ee937c9587325e613f993dcaf707bd224da38b159ff733c3ae580a767e8acfa4877e847827013d", 0x50) [ 774.167598] hfs: unable to load codepage "none" [ 774.172342] hfs: unable to parse mount options 12:06:28 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:28 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x700}) [ 774.245715] hfs: unable to load codepage "none" [ 774.257264] hfs: unable to parse mount options 12:06:28 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0xc0) mmap$binder(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x2000000, 0x11, r0, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) r1 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000000c0)={0x0, 0x4}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000140)={r2, @in6={{0xa, 0x4e20, 0x9, @empty, 0x1}}, 0x2, 0x3, 0x1f, 0x2, 0x1f}, &(0x7f0000000200)=0x98) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000280), &(0x7f0000000340)=0xc) bind$alg(r1, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$BLKRESETZONE(r3, 0x40101283, &(0x7f0000000040)={0x1f}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000000240)) 12:06:28 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 774.535973] hfs: unable to load codepage "none" [ 774.540840] hfs: unable to parse mount options [ 774.586083] hfs: unable to load codepage "none" [ 774.593636] hfs: unable to parse mount options [ 774.630869] hfs: unable to load codepage "none" [ 774.636378] hfs: unable to parse mount options [ 774.757099] hfs: unable to load codepage "none" [ 774.766040] hfs: unable to parse mount options 12:06:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha384\x00'}, 0x797b1e47cc8f40a8) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0xc) accept$alg(r0, 0x0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x54ac, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x7, @dev={0xfe, 0x80, [], 0x29}, 0x200}, @in={0x2, 0x4e20, @empty}, @in6={0xa, 0x4e23, 0x7f, @mcast1, 0xffffffff}, @in6={0xa, 0x4e21, 0xa5ed, @remote, 0x7}, @in6={0xa, 0x4e24, 0x761, @loopback, 0x9}, @in6={0xa, 0x4e23, 0x2a, @dev={0xfe, 0x80, [], 0x18}, 0x1}], 0x9c) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f00000000c0)=0xfffffffffffffffe, 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0xfffffffffffffd08) 12:06:28 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000900)='stat\x00') syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:28 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:28 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0xa00}) 12:06:28 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x4800000000000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:28 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000480)={0x79, 0x0, [0x404]}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000001940)={"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"}) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x8040ae9f, &(0x7f0000000040)) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x100000253, 0xfffefffffffffffc, 0x0, 0x1cd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000180)) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f0000000100)) setsockopt$inet_udp_encap(r5, 0x11, 0x64, &(0x7f0000000000)=0x1, 0x4) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet6(0xa, 0x0, 0x0) 12:06:29 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000900)='stat\x00') syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 775.115420] hfs: unable to load codepage "none" [ 775.120276] hfs: unable to parse mount options 12:06:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x28a) [ 775.156546] hfs: unable to load codepage "none" [ 775.164085] hfs: unable to parse mount options 12:06:29 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 775.198465] kvm: vcpu 0: requested 34784 ns lapic timer period limited to 200000 ns 12:06:29 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x1020}) 12:06:29 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x4c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:29 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:29 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20\x00', 0x1ffffe, 0x0) r1 = accept4$inet(r0, 0x0, &(0x7f0000000280), 0x80800) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000340)={{0xffff, 0x100}, 'port0\x00', 0x10, 0x10000, 0xc39b, 0x1, 0x8001, 0x0, 0x7, 0x0, 0x2, 0x8}) fsetxattr$security_ima(r1, &(0x7f0000000400)='security.ima\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="160e9b428b94b9e3d0919e35901f7c095a8d33ec74c7"], 0x16, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xc3, 0x20002) inotify_add_watch(r3, &(0x7f0000000080)='./file0\x00', 0x7) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000040)=0x0) inotify_init() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f0000000100)={{0x0, 0x6, 0x80000001, 0x4, 'syz1\x00', 0x4}, 0x4, 0x203, 0x7, r4, 0x1, 0x338, 'syz1\x00', &(0x7f00000000c0)=['\x00'], 0x1, [], [0x1, 0x8, 0x4, 0x400]}) bind$alg(r2, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x10) 12:06:29 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 775.494299] hfs: unable to load codepage "none" [ 775.533314] hfs: unable to parse mount options [ 775.598093] hfs: unable to load codepage "none" [ 775.606433] hfs: unable to parse mount options [ 775.678033] hfs: unable to load codepage "none" [ 775.683457] hfs: unable to parse mount options 12:06:29 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:29 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x2000}) 12:06:29 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x6000000000000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:29 executing program 2: openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000480)={0x79, 0x0, [0x404]}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000001940)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfe2f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r3, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x490482, 0x0) ioctl$sock_SIOCBRADDBR(r4, 0x89a0, &(0x7f00000001c0)='veth1_to_bridge\x00') r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/dlm_plock\x00', 0x4240, 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r4, &(0x7f0000000300)={&(0x7f0000000200), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r6, 0xa, 0x70bd25, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40000) syz_genetlink_get_family_id$tipc2(&(0x7f0000000840)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000900)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="000130bd7000ffdbdf250c2100000800020004000400"], 0x1}}, 0x4) dup(0xffffffffffffffff) ioctl$sock_TIOCOUTQ(r3, 0x5411, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000480)=ANY=[@ANYBLOB="cfec306e4e9c974d7ac5fd540a5b0297fa3d8f17584fa7831e5d69eac8c708fc004c4c780b332e73ca9196012f0680db2f071c2d4e2c26a51829c2318452f1c573b359c3068c0180000000000000c509ae36de27fd73482d8b0cc024b58b09dffbbd9ed49e88214104ba0426c9e5548ffe3ae3c97c7cadf1c516ecd704491e01ffb51a149ed7febf96031279d864a206a5bca77da32e395478dc150795661d53b0d0dc962de334402ed28090ab0bb6063efcbb4a6471e59289694c33e5adad07262d"], 0x0) rmdir(&(0x7f0000000040)='./file0\x00') syz_open_dev$swradio(0x0, 0x1, 0x2) r7 = socket$packet(0x11, 0x3, 0x300) syz_open_dev$sndpcmp(&(0x7f0000000340)='/dev/snd/pcmC#D#p\x00', 0x6, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000000)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f0000000180)={r8, 0x1, 0x6, @local}, 0x10) getsockopt$inet_udp_int(r5, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000400)=0x4) 12:06:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 12:06:29 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:29 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 776.030892] hfs: unable to load codepage "none" 12:06:30 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x100000001, 0x0) write$UHID_INPUT(r1, &(0x7f0000000340)={0x8, "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", 0x1000}, 0x1006) [ 776.064336] hfs: unable to parse mount options [ 776.077415] hfs: unable to load codepage "none" [ 776.083315] hfs: unable to parse mount options [ 776.147302] device veth0_to_bridge entered promiscuous mode [ 776.202913] hfs: unable to load codepage "none" [ 776.207829] hfs: unable to parse mount options 12:06:30 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:30 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x2010}) 12:06:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0xbe6971b6fb8b4890) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040), &(0x7f00000000c0)=0x100000127) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000080)='/dev/vfio/vfio\x00') 12:06:30 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x6800000000000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:30 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 776.406254] device veth0_to_bridge left promiscuous mode 12:06:30 executing program 2: openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1) fallocate(r0, 0x0, 0x0, 0x8001) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x208582c, &(0x7f0000000300)=ANY=[@ANYBLOB="741372616e7339756e69782c6c6f6e73652863611c17000a6368653d7f6e652c838969643e", @ANYRESDEC=r1, @ANYBLOB=',permit_directio,\x00']) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) connect$netrom(r2, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(0xffffffffffffffff, 0x0) r4 = geteuid() write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000780)={0x78, 0xfffffffffffffffe, 0x5, {0xfffffffffffffffc, 0x3ff, 0x0, {0x3, 0x0, 0x3, 0x0, 0x0, 0x10000, 0x3ff, 0x8, 0x80000001, 0x0, 0x6e, r4, 0x0, 0x6, 0x8}}}, 0x78) listen(r2, 0x0) gettid() fstat(0xffffffffffffffff, &(0x7f0000000840)) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00000002c0)={0x1f, 0x0, 0x2000}, 0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getgid() getresgid(&(0x7f00000014c0), &(0x7f0000001500), 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r3, 0xae44, 0x8) getgid() getpgid(0xffffffffffffffff) r5 = accept(r2, 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) sendmsg$rds(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000000c0)=""/250, 0xfa}, {0x0}], 0x2}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x2) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) 12:06:30 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:30 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 776.589399] hfs: unable to load codepage "none" [ 776.595167] hfs: unable to parse mount options [ 776.606383] hfs: unable to load codepage "none" [ 776.611211] hfs: unable to parse mount options 12:06:30 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x6c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 776.711531] hfs: unable to load codepage "none" 12:06:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'ccm_base(pcbc-aes-aesni,rmd160)\x00'}, 0x184) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x40) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000040)={0x10000, 0xd0, "28ce2d0349d460caa620ad0c2be54dcd0119657bfc9fc9859ba12a88fa1c951804372d0a2fb564954d94cf169952928489fcf0a80a9888d4c990ed9a677a771a228794d5023052e2d961edf513cc81ba6ab4237bf10bb46df5946962450b0ddb0074e6837951fef361c9fce5aef029104e4a7f889f52ecfec2855b5f57e09eba1fa75be90ad995455cf1717ef51717653e80bd9a98a383f3c2e08c34f3570fc6602d1a2a0b1c74ff60fa1a0c6d8c2c6a877c86e5273c8d7fe1c06b3214640703e35b7b5e187c15357964dd3352931253"}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 776.732999] hfs: unable to parse mount options 12:06:30 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:30 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:30 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x3f00}) 12:06:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000000)={0x0, 0x70, "a0f80996d15cf9b7eaf01b4fb5eeca4677907e95726f59614c45ed48d959ca129db9ae05132d9d4f62c3e34c544a8d9310addad8ec17c17a3aab91cfaad8c30a6a4fab90b3a12a089079c440d9d510b6cf0496bcb8dca1652ddd8c80c52a5f5dd7a5f5c385e7ab264fc7ade2fe19e9c2"}, &(0x7f0000000080)=0x78) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000000c0)={r2, 0x5, 0x10, 0xfffffffffffffff7, 0x2}, &(0x7f0000000100)=0x18) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 776.918922] audit: type=1804 audit(1547813190.861:72): pid=2831 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir780718969/syzkaller.sSoGTd/1043/file0" dev="sda1" ino=16961 res=1 12:06:30 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x7400000000000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:31 executing program 2: openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000480)={0x79, 0x0, [0x404]}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_S390_VCPU_FAULT(r2, 0x4008ae52, &(0x7f0000000180)=0x40) timerfd_gettime(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000001940)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfe2f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f0000000100)) accept$netrom(r3, &(0x7f0000000000)={{0x3, @default}, [@default, @default, @remote, @default, @rose, @bcast, @bcast, @rose]}, &(0x7f0000000080)=0x48) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet6(0xa, 0x0, 0x0) [ 777.078086] audit: type=1804 audit(1547813190.911:73): pid=2847 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir780718969/syzkaller.sSoGTd/1043/file0" dev="sda1" ino=16961 res=1 12:06:31 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:31 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) recvfrom$unix(r1, &(0x7f0000000040)=""/214, 0xd6, 0x100, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) [ 777.165465] hfs: unable to load codepage "none" [ 777.170323] hfs: unable to parse mount options [ 777.231761] hfs: unable to load codepage "none" [ 777.240771] hfs: unable to parse mount options 12:06:31 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 777.330296] hfs: unable to load codepage "none" 12:06:31 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x7a00000000000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 777.375273] hfs: unable to parse mount options 12:06:31 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x4000}) [ 777.559531] hfs: unable to load codepage "none" 12:06:31 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 777.582311] hfs: unable to parse mount options 12:06:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) prctl$PR_SET_THP_DISABLE(0x29, 0x1) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 12:06:31 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 777.732200] hfs: unable to load codepage "none" [ 777.747800] hfs: unable to parse mount options [ 777.763398] hfs: unable to load codepage "none" [ 777.775944] hfs: unable to parse mount options 12:06:31 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r1, &(0x7f0000000000)='ns/pid_for_children\x00') bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 777.965977] hfs: unable to load codepage "none" [ 777.973172] hfs: unable to parse mount options [ 778.006840] hfs: unable to load codepage "none" [ 778.019383] hfs: unable to parse mount options 12:06:32 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x40, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000480)={0x79, 0x0, [0x404]}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000001940)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfe2f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) clock_gettime(0x1, &(0x7f0000000240)) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x1, 0x20, 0x1, 0x5}, &(0x7f00000002c0)=0x18) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000300)={r5, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}}, 0x8, 0x8000}, 0x90) r6 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) fcntl$F_GET_RW_HINT(r6, 0x40b, &(0x7f0000000100)) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") fsetxattr$security_smack_transmute(r6, &(0x7f0000000540)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000580)='TRUE', 0x4, 0x2) getsockopt$bt_l2cap_L2CAP_LM(r6, 0x6, 0x3, &(0x7f0000000400), &(0x7f0000000500)=0x4) fcntl$setsig(r2, 0xa, 0x31) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r6, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x4}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000180)={r7, @in={{0x2, 0x4e21, @loopback}}, 0x7692, 0x200}, &(0x7f0000000080)=0x90) r8 = mmap$binder(&(0x7f0000ff5000/0x4000)=nil, 0x4000, 0x2, 0x10, r6, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r6, 0xc018620b, &(0x7f00000003c0)={r8}) 12:06:32 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x100000001, 0x0) r2 = eventfd2(0x81, 0x800) ioctl$SIOCRSGL2CALL(r1, 0x89e5, &(0x7f0000000200)=@netrom) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) ioctl$VIDIOC_S_PARM(r1, 0xc0cc5616, &(0x7f0000000340)={0xf, @raw_data="c1a2e01ac00cde41583ec8ec31c50faa892736da5db93bb17dc8d752e7a9bf725115e5371e0e18fd68ead26725a5442579dc9ee95eff122d83804dbbc1afe574d9ef441e5f9cc4fd704d0a922f9db50b38121d70f09eb20a89641553166700dc0d3d6148e0012f439468e59f4ff55d47d70f3acee58e0dfb38670089005332bc5c0d11e476183a030f4b2e965818813851b9ba235fc626cec45d812adbd25cd6cd6e26f9c4a47d20833ebc22b0ee28357cecaaa144537c75ee1ce10e263b94fc827152cea57c7855"}) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB="04020000392650c67c7f0d38b21c3204408ab1bb536e4e924cfe5010f5223a921eb7ae691a85a2a998fd2d95bbd17c0132f53c9370ffeeae7df98e1a3ea851d3e2d915b1551506c93da336b27dc5808f3822398baf1ad05f4c205680c1dbde12e9e7daa137d7a8df2b99f2d6575e84", @ANYRES16=r3, @ANYBLOB="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"], 0x204}, 0x1, 0x0, 0x0, 0x4040010}, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f0000000180)={0x4, "095bc9085778956a72beb8b81436cc0d01bbfdce186649ccb548d97b5f787c50", 0x0, 0x224, 0x9, 0xdfc, 0x5, 0x5, 0x4, 0x957}) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000040)=r2) 12:06:32 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:32 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0xedc0}) 12:06:32 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x97ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:32 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 778.261141] hfs: unable to load codepage "none" [ 778.268691] hfs: unable to parse mount options [ 778.294614] hfs: unable to load codepage "none" [ 778.311731] hfs: unable to parse mount options 12:06:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0xffffff08) 12:06:32 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:32 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 778.404741] kvm: vcpu 0: requested 34784 ns lapic timer period limited to 200000 ns 12:06:32 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 778.468633] hfs: unable to load codepage "none" [ 778.473566] hfs: unable to parse mount options 12:06:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x10002, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000040)=0x22, 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 778.735554] hfs: unable to load codepage "none" [ 778.740622] hfs: unable to parse mount options [ 778.878042] hfs: unable to load codepage "none" [ 778.885276] hfs: unable to parse mount options 12:06:33 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x20000}) 12:06:33 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0x8000) bind$alg(r1, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x1, 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={0x0, 0xfffffffffffffff7}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000000c0)={r2, @in6={{0xa, 0x4e22, 0xb6b, @remote, 0x37e43ad9}}, 0x4, 0xb44, 0x80, 0x52f1c059, 0x5}, &(0x7f0000000180)=0x98) 12:06:33 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:33 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0xfcfdffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:33 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000480)={0x79, 0x0, [0x404]}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000001940)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfe2f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f0000000100)) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") syz_kvm_setup_cpu$x86(r2, r0, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000000)="66baf80cb892aadf82ef66bafc0c66ed66410f6d380fc71de311c6a70f01dfb8010000000f01d9660f38829f0080000048b8b9ef9e3e3250fc040f23c80f21f8350800b0000f23f8b9800000c00f3235010000000f30b9bc0b0000b800200000ba000000000f3026420f01cf", 0x6c}], 0x1, 0x3b, &(0x7f0000000180)=[@cr4={0x1, 0x40}], 0x1) socket$inet6(0xa, 0x0, 0x0) 12:06:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x10000, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x40}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0)={r2, 0x9e}, &(0x7f0000000100)=0x8) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x95dcc6b811e889e6) [ 779.202117] hfs: unable to load codepage "none" [ 779.207996] hfs: unable to parse mount options [ 779.214966] hfs: unable to load codepage "none" [ 779.219954] hfs: unable to parse mount options 12:06:33 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:33 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:33 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x40000}) 12:06:33 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0xfdfdffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0xe, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x46}, [@ldst={0x3, 0x2, 0x0, 0x0, 0x0, 0x1c, 0x1}, @jmp={0x5, 0x9, 0xd, 0xd, 0x0, 0xffffffffffffffc0, 0x1}, @map={0x18, 0x3}, @call={0x85, 0x0, 0x0, 0x15}, @alu={0x4, 0x1, 0xe, 0x3, 0x9, 0xfffffffffffffffe}, @alu={0x7, 0x7, 0x7, 0x3, 0xf, 0xffffffffffffffc0, 0xfffffffffffffffc}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0xc433, 0x0, 0x0, 0x0, 0x800}]}, &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xa4, &(0x7f0000000100)=""/164, 0x41100, 0x1, [], 0x0, 0x2}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 12:06:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x4000) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040)=0x7, 0x4) [ 779.646153] hfs: unable to load codepage "none" [ 779.651466] hfs: unable to parse mount options [ 779.667041] hfs: unable to load codepage "none" [ 779.678301] hfs: unable to parse mount options 12:06:33 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:33 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:33 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0xfdffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 779.810767] hfs: unable to load codepage "none" [ 779.825359] hfs: unable to parse mount options 12:06:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) socketpair(0x1f, 0x1, 0x901e, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x7fffffff, 0x10, 0x86a1, 0x8e}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000000c0)={r2, 0xbb0, 0x20}, &(0x7f0000000100)=0xc) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 780.068368] hfs: unable to load codepage "none" [ 780.073540] hfs: unable to parse mount options [ 780.119089] kvm: vcpu 0: requested 34784 ns lapic timer period limited to 200000 ns 12:06:34 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x6}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000180)={r2, 0xbc, "bc3de86f4d6a889e404293860f318ffcb00d4c5bbd53690bdfe6ca3750b1618d1f95d82457c58067c43bd4af0b0c469cbb49d9c2fadceadbabbeb09486b60198ffb03e6222da1d2b787bf5ebb2d101de5fb238be037e011bb414357ba10fae28905ce77259f54f61f8670d960a7de97f2158386a86234405cc10e164e62ad77fb5fa5b06e0e46417476acacdaa6ca15caf7db962976098a5ef23e59ac363dc8ebc224a0b8062cfdc61e0da8d10964eb4a8e63d1cb59f5a4c8b19ec6d"}, &(0x7f0000000280)=0xc4) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r3, 0x4068aea3, &(0x7f0000000480)={0x79, 0x0, [0x404]}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000001940)={"a523fb9656eb871ffcd7ffeb51d84e738a55eba841ae487e33cdd921e8a51ce6c924020f0ac3562dd8cdeb31deac16f46da4ac16ee8165bce439eddce671c5b0a1103ea3f86a43cbb78504f6f9c77c2f09dc27632ec6036ee52a87e321e707c0cfe15576c26d52d0334c8d4693e127b3a046a5ed7796c9c5017cfd58ec871ed76369846fea9ebfa2f7f96496abf4ef57ed1ecd930eb9e13396875f01e932804ffe8a34c8fbedd97cdfb3176ec59fbbfd20a6ff17795431c341a35eb0f5f703480a5211cc6a7e2084e4a9b6aedf60b7b8084b00ca2cbed255b4cc4679c967432fea5e95119f9635e94794aab6ef54f290677fa08d0ee2cc8eae468efd02417055d3f3ccc86b629dfb878c4d115c16c75fe352cffa93648cf49577256b5d2faf0634335c97ffff966ae90cbf81250df3613c25d2789c869c9cc95a6e9d364c4c684059c593f9950e66cf81cd9f36d73fade4f0cbb795010364d13ff32c12efd91d0ebb6533700945f2db6113a630bd521eec89a74c46e1733b72d6e4d2ccee3b40f99809a9a4fb5fc2d1c53e1366d455bcbe81893100ab56b2556b55c1a0c5787356b464c3bf7011488e55f587a6d4420d46d69a74ee5bbfbcb0d6cb00aae8c3dfd6dd2e9f76d7a542f20553207b668dce69f1b463ee9166e81bb109f461b8885f15c9e525d72260ccdbd69e3345612158114780b9409ea856cb724faa6ed27ba836b35c10e7c7d43f2fa34f98f16a00f31565e16a213eaf4a7f438c89733ebe6d16328b930fd942bc64d631dd1f2aa1cc2ccdaff2324076c83e1ba4d2a0e40e010c96b42e7a4a76cd7a89ef592b9b3030f62d9fbd565ee5908ab90b42620b61e5d1e08621a31d21003cd12a450461636472fa64a7e1b98778bfb482fb4b4da31b42ee98b10f9c0f4c085d08c37ee2e3a9e4a5aff72a0ab844fcbfa224842c85f6cdfd25829c44760e3859624f891df4824f7d17938ac2dee1412cf3083e1d5ee2d29b63267ccba535409da7bef05d3fa79a3ef037ee609e01ad345ee17f48b5e8510f767de35df4dfb856f7533ad88866c6b01fe345107ba7191a8809e2e014492acf9c4f35cad664198a65c55f884490f4b30b4526324be842c393f336f16bea2bf6c6b917fdb751e12ff689ab4ffa44625a8b2bc1de4e88682abe5ce9d1942792747681ad23c31046d825140987f19a9cf10323c3f50a20f35a6d1dd8ca6758296b4537a0da1a853011b777623c8774b3689897cf9264a7782470847f36a8093f04000000663438ab39d8a777fb3e10cb4a2402a939a98d387087c5ca5fd8fbc4d96ae698b5bb84a0a8484e2b85743e623a033eb5b1889ccfb4b95885bc69d4c1cb819b95e7923e557c9ec9ec10e94d1e1295fc2f256fa095036f6cfc04c414fc57fc72c120614a586089c93741e97a61c46600"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfe2f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x3) ioctl$PIO_CMAP(r6, 0x4b71, &(0x7f0000000000)={0x822, 0x1, 0x397c2b33, 0xbc7, 0x3, 0x6}) fcntl$F_GET_RW_HINT(r6, 0x40b, &(0x7f0000000100)) ioctl(r5, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet6(0xa, 0x0, 0x0) 12:06:34 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0xffffff7f00000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:34 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x1000000}) 12:06:34 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:34 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x1007f, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) socket$alg(0x26, 0x5, 0x0) r2 = dup3(r1, r1, 0x80000) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x4, 0x3, 0x7, 0x2, 0x9}, 0x14) bind$alg(r1, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) write$UHID_INPUT2(r2, &(0x7f00000000c0)={0xc, 0x60, "adc443a4f597f1c9a08d7105f638dc15344d0ea79e7aceb3de63f184f72fdd5928fe7e784f6dc065cc354896d401703f39d128241d19b5ede6af8a70d3d589daf152dd6e71df263e4ea58bb5dda2a4a7304e201d7b8cb28ad6be3acd20e60eff"}, 0x66) r3 = socket$alg(0x26, 0x5, 0x0) ioctl$void(r3, 0x5451) 12:06:34 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 780.185705] hfs: unable to load codepage "none" [ 780.190757] hfs: unable to parse mount options 12:06:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x260000, 0x0) ioctl$VIDIOC_G_FBUF(r1, 0x8030560a, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)="601fc0cdefda9824fa3ec40222515b7a40403c066fda6435805947d118b70dbecf699d900e82fabdf372909bfb436ae406f18e197c19c1ecd2176759e3b8fa933115616e388e2a1392a0b0bc7cd0c31c15885c576b64832dbb3af5b0f7c9814c3a9e32895e5fee03ecfd00b56cf79a25be48d0d2958095a729a24d670b1971e24ab40fcac9ee5c407d1fb057556e08747ff842a6e1a226c77baf73cda5b1629be7755620d7ba0a586421591a3fb3210c16b1fc91eb50815376132aaa4f280c621870b6349875f7d9bee94309", {0x8, 0x7, 0x31424752, 0x9, 0xffc0000, 0x5, 0x0, 0x7}}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x3}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000200)=@assoc_id=r2, &(0x7f0000000240)=0x4) [ 780.400796] hfs: unable to load codepage "none" [ 780.406920] hfs: unable to parse mount options 12:06:34 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:34 executing program 4: sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 780.555799] hfs: unable to load codepage "none" [ 780.562314] hfs: unable to parse mount options 12:06:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 780.597238] hfs: unable to load codepage "none" [ 780.609005] hfs: unable to parse mount options 12:06:34 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:34 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x2000000}) [ 780.909716] hfs: unable to load codepage "none" [ 780.916792] hfs: unable to parse mount options [ 781.000642] hfs: unable to load codepage "none" [ 781.005359] hfs: unable to parse mount options [ 781.118921] kvm: vcpu 0: requested 34784 ns lapic timer period limited to 200000 ns 12:06:35 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000480)={0x79, 0x0, [0x404]}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000001940)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfe2f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x7e}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000001c0)={r6, 0x1f, 0x10, 0x8, 0x81}, &(0x7f0000000200)=0x18) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f0000000100)) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$DRM_IOCTL_AGP_ALLOC(r5, 0xc0206434, &(0x7f0000000000)={0x6, 0x0, 0x2, 0x1}) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0xf) ioctl$DRM_IOCTL_SG_FREE(r5, 0x40106439, &(0x7f0000000040)={0x800, r7}) exit(0x3) socket$inet6(0xa, 0x0, 0x0) 12:06:35 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:35 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x151bd35c) 12:06:35 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:35 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x3000000}) 12:06:35 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 781.286552] hfs: unable to load codepage "none" [ 781.294828] hfs: unable to parse mount options [ 781.324453] hfs: unable to load codepage "none" 12:06:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2140, 0x60) recvfrom$inet6(r1, &(0x7f0000000040)=""/97, 0x61, 0x40000102, &(0x7f00000000c0)={0xa, 0x4e21, 0x2, @loopback, 0x10000}, 0x1c) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 781.344417] hfs: unable to parse mount options 12:06:35 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 781.468957] hfs: unable to load codepage "none" [ 781.508951] hfs: unable to parse mount options 12:06:35 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:35 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:35 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x4000000}) [ 781.773986] hfs: unable to load codepage "none" [ 781.778716] hfs: unable to parse mount options [ 781.832818] hfs: unable to load codepage "none" [ 781.837638] hfs: unable to parse mount options [ 781.930972] hfs: unable to load codepage "none" [ 781.935867] hfs: unable to parse mount options 12:06:36 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000480)={0x79, 0x0, [0x404]}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000001940)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfe2f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f0000000100)) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet6(0xa, 0x0, 0x0) 12:06:36 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x5000000}) 12:06:36 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0d92412b8d88fb6369135a04e4335facc779c37b7ec4e4210b878bd1604b3f9a8b227dbcfacb162837d30e0ca7e9eb8baede8ee85eec3b8b5b62ac128bc89bee60ad25a4c0b14424def46212", 0x4c) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 12:06:36 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:36 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x2, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:36 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(tgr128-generic,ctr(cast5))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 12:06:36 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 782.367016] hfs: unable to load codepage "none" [ 782.372092] hfs: unable to parse mount options 12:06:36 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x3, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:36 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:36 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x6000000}) [ 782.582934] kvm: vcpu 0: requested 34784 ns lapic timer period limited to 200000 ns [ 782.638199] kvm: vcpu 0: requested 34784 ns lapic timer period limited to 200000 ns 12:06:36 executing program 2: openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000480)={0x79, 0x0, [0x404]}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000001940)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfe2f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f0000000100)) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet6(0xa, 0x0, 0x0) 12:06:36 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0xffffffffffffffed) 12:06:36 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x4, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:36 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 782.805250] hfs: unable to load codepage "none" [ 782.821910] hfs: unable to parse mount options 12:06:36 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x5, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x800, 0x20000) r2 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0xdc, 0x101400) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000080)={0x3, r2}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 782.927700] hfs: unable to load codepage "none" [ 782.941880] hfs: unable to parse mount options 12:06:36 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:36 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:37 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x7000000}) 12:06:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x207, 0x5, 0x8, 0x9, 0x7, @broadcast}, 0x10) 12:06:37 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x6, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 783.336835] hfs: unable to load codepage "none" [ 783.345083] hfs: unable to parse mount options [ 783.443109] hfs: unable to load codepage "none" [ 783.451419] hfs: unable to parse mount options [ 783.763243] kvm: vcpu 0: requested 34784 ns lapic timer period limited to 200000 ns 12:06:37 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000180)={0x79, 0x0, [0x404, 0x0, 0x0, 0x3]}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000001940)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfe2f) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x521040, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r3, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000040)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000080)={r4, r5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) fcntl$F_GET_RW_HINT(r7, 0x40b, &(0x7f0000000100)) ioctl(r6, 0x1000008914, &(0x7f0000000280)="a070") socket$inet6(0xa, 0x0, 0x0) 12:06:37 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) 12:06:37 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0xa000000}) 12:06:37 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:37 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x7, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:37 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:37 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:37 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x10080, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f00000003c0)={0x0, 0x5, 0x30, 0x3, 0x8000}, &(0x7f0000000400)=0x18) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000440)={0x0, 0x1, 0x0, 0x9, 0xffffffff}, &(0x7f0000000480)=0x18) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000004c0)={0x0, 0xab2}, &(0x7f0000000500)=0x8) sendmsg$inet_sctp(r0, &(0x7f0000000600)={&(0x7f0000000040)=@in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000080)="c8045b957d61c8f7e28de1402786501ee8cad78df42389bd373dedd761d9388c10cea3adb087e4bf3243a53a68dbe67146ff7b8489f15ebc43e768d37de8af7be0e03f83fd3d40d58155deea8e296b97d48a243e64d20dfb9644a9cbaf627b12db1e275f3e4eea15ab462a38f77eb1049ab22123f61455e703ccaa4d7940c384e625e9b6bbe26392207234fef8bf577d32a672390e00250ab8ecacafdd67840407f1494dc722fc7e145250c161f64a0554ee5bafc8f0ee0d2bf4261a8aa95142ea7de7707da1d25cb08c9edb0f839054bced", 0xd2}, {&(0x7f0000000180)="d8fdb05583287214156f11bb4654a444c4d5e5256169bdcad8d09fb472fbfa7b2b8ea510d9a9d8df93b7980e5e076266cd9d344af2545efdf3c9696cc0eb591fbef10f9981fc68d86f68c8ccd4083f96ea3eb61a799b8d2eb9ca665e11bf7cb6", 0x60}, {&(0x7f0000000200)="005ed12e36cb44facb4ae4afe336b9d780bf662db79ef43607b2408bc398c862533d50a900b7613ea5e0320d29f080eb897ea395073bbeddbeeea9effb2cae973b4f07dc7c1b5ca666ad59c8cca28d72617a0815dd44c94e5561afa7fe4ebdd7cfe43ae3ba1dc63bf10e6f5dd2b37692f97a44aa0996", 0x76}, {&(0x7f0000000340)="45228185e03b5858cbf758603be6aefd6a815794f9bf22418193a8f4cb87f26392820394210d24816c2f0a2c7ccaf1d28e34afc57a4e0bad186834e5db27c5f6d1659d7fbb4aa84b629f5c8b86a09bd35394f6a7a7de51bb3149b4d7a661e641fddce312ece2a4e261471a65921a3c7056144d98eb3c88", 0x77}], 0x4, &(0x7f0000000540)=[@sndrcv={0x30, 0x84, 0x1, {0x8, 0x7, 0x200, 0x80000000, 0x3ff, 0xff, 0x3, 0x1, r1}}, @init={0x18, 0x84, 0x0, {0x3ff, 0xfffffffffffff160, 0x32, 0x33c}}, @sndinfo={0x20, 0x84, 0x2, {0xffffffff, 0x4, 0x9, 0x1, r2}}, @sndrcv={0x30, 0x84, 0x1, {0x7, 0x2b24, 0x1, 0x5218, 0x8001, 0xac, 0x5, 0x40, r3}}, @init={0x18, 0x84, 0x0, {0x4, 0x1f25, 0x101, 0x80000001}}], 0xb0, 0x8000}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0xe3eb25fe) 12:06:37 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0xa, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 783.983905] hfs: unable to load codepage "none" [ 783.999135] hfs: unable to parse mount options 12:06:38 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 784.035569] kvm: vcpu 0: requested 34784 ns lapic timer period limited to 200000 ns 12:06:38 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x32f) 12:06:38 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 784.149952] hfs: unable to load codepage "none" [ 784.154804] hfs: unable to parse mount options 12:06:38 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:38 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x10, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:38 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x200800, 0x0) setsockopt$inet_dccp_int(r0, 0x21, 0x3, &(0x7f0000000200), 0x4) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='skcipher\x00', 0xffffffffffffffff}, 0x30) r3 = geteuid() fstat(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={r2, r3, r4}, 0xc) r5 = shmget$private(0x0, 0x1000, 0x78000000, &(0x7f0000ffe000/0x1000)=nil) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000140)={{0x8, r3, r4, r3, r4, 0x8, 0x80}, 0x3f, 0x9, 0x9, 0x100000000, r2, r2, 0x8}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 12:06:38 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x20000000}) 12:06:38 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:38 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:38 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xc1, 0x541200) write$FUSE_DIRENT(r1, &(0x7f0000000080)={0xa0, 0x0, 0x5, [{0x6, 0x9, 0x17, 0xbf, 'trusted.overlay.impure\x00'}, {0x1, 0x401, 0x0, 0x4}, {0x3, 0x7, 0x4, 0x1ff, 'eth1'}, {0x2, 0x6, 0x9, 0x8, 'skcipher\x00'}]}, 0xa0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) fremovexattr(r0, &(0x7f0000000000)=@known='trusted.overlay.impure\x00') 12:06:38 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x48, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 784.647593] hfs: unable to load codepage "none" [ 784.655206] hfs: unable to parse mount options 12:06:38 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/74, 0x4a}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:38 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:38 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000900)='stat\x00') syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:38 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0xffffffffffffff70) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) rseq(&(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x3, 0x9, 0xfff}, 0x4}, 0x20, 0x0, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xdd, 0x481) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000040)={{{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000180)={@empty, @dev={0xac, 0x14, 0x14, 0x27}, r3}, 0xc) recvfrom$rose(r0, &(0x7f00000001c0)=""/165, 0xa5, 0x0, &(0x7f0000000280)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @default}, 0x1c) [ 784.744480] hfs: unable to load codepage "none" [ 784.749625] hfs: unable to parse mount options 12:06:38 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x4c, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:38 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x20100000}) 12:06:38 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x20c0, 0x0) ioctl$SIOCX25SCAUSEDIAG(r0, 0x89ec, &(0x7f00000000c0)={0x2, 0x2}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(des3_ede)\x00'}, 0x58) getcwd(&(0x7f0000001540)=""/26, 0x1a) syz_read_part_table(0x0, 0x7, &(0x7f0000001480)=[{&(0x7f0000000100)="6f079aebee4c7350c74d44e8fba31720aaffde80fd30a5b877680e1513b558c40757bf235a195d0a7bb8d8d9ea766a487ae91358f9ed4669e159a4cce8732c25e709aaeaceff867d4950db213afad68194", 0x51, 0xfffffffffffff000}, {&(0x7f0000000180)="e1351d7c78a7dfdd10d5659e911f80511342f0c5e81a76b81588575a770593a2f3fcd9b7a5585bb98725285d7789af1c14b055a67e24cca08246dfbfce5a", 0x3e, 0x8}, {&(0x7f00000001c0)="85b9c70e1c33191a74b0ebfe4e22e99f8f489cebde78a89ee5063824019222fb8d6eb1b6c6b2d172198fcee6abb96e87a0c897c167f3fbd6a6439582a5ad8233d1510207a59b9ce3c8ac27449c1c85221f430f10644d345b7ca7512551066c72781117f242b1a0e77c9454fd759643123c70f60e8c37f6e77434c2", 0x7b, 0x3ff}, {&(0x7f0000000340)="7637349071ba703fa37d5fb4471df85d5f6c333cee878a19000d18ac24ce8621ae68de7061784fab58fea7be9a3d5b6351303f390b5570c2d6adcec297c8febe1feffa8237d8e19e706db7db78e1e30dd7b1ad2a8ab88923179228fdd1c0e317791408502f83d538a2fb0459d2648f90e0b6d5576b11cf74cc1f2d909d79f512eb3b8fa14d03a15878c5b545008939406dff45d9318b9583d5acab4a3e31cf15b59584351be63f4b8036cbd66f66f36297c1e3b10ebedbc91030bbc56372423df5bb15c107b8991949f6a49c6e616605e919b0cbc49342a3fe81c573a512c5457a0a318e43eea13f78869f94968b0947", 0xf0, 0x6}, {&(0x7f0000000440)="2261f59571b3d75b6b8926da69a1340c182fe6deded576d1d661670c5d7b7cd20366ba160b6eb0c94e06e15f99ee2fbc44a68c58284985086dc235590af1f6052c890c4f17c5342849afc48106864f3e6b66eecd79c17549fbeec5a872eb45eef453c831bf3237043e2635bc29e36391749a81daa3e6e418dd05bf7eeaa9d450bdabce21ec637c4e5d9066331ea847330a6ea2a0c180ce3f884c86f543068ce4d676f53e5c25dd990fa60c90655a839fd7739a95c5c0f647576c0f0d89c8bdd93c2437dc243129ee198af5396d612ad38c1eb7afe09103f5891cb48970d56895510502712956357082380234257baf9290c6e72154bc42fda3bd22a916947b13a2d29a812c024841d0f983564b9b3fb92bdccf7d35394a99c25f85fd80ac36b6b2c5b21aaf30d77d7771fe4ad509a3c06f20ecdd354e7dc12d9c3a3cdb4140540e4a13ffd03961784b1f631dd69f46f47bc3cc1f8c87bb43b581a6acf53b4872ca3897ce397a8f65bf332355192c5b859271b27d78dc2a9563aa5a71abb06d7c9281b32efe716d06c646e330df62f87fa8bb538cbb29bfe09f8ecf9f3e73180909b83d6538897e8c5e7746092c1ce82a55432dd0b63d09eb71c154371b1de4a7b66a9c986685a40ec06c755f3d0d9df57b372991ae89c1b9cecf5f4da57f319f9fac4b474c5a8716e1c4ac56d77376c10e16ba4872b38f76dd827edc66b11032673c71325f868b58b2394257c4fcd3c693d99e70f193f6aad992dd35640a7608ca5c9795e0a87b888e7e74460539464f00a8694e881196dc679121c90e684c47bef1e560834714c23b38cdc87fc9e27fcd94eaa7965b43a82a2e516f8ea920685571583dd364e227cddb5b0f4d294761a2b01676a3af4c65c7263f80d095ff5feb4c87beeb29a5799b440af460da6db2221fdadc77847adbc9fca0ed22d6682409b50b6b52f0520990640fd5258eb18470f786b727add37a7b2320b9f5710bdc7e1e74ed03ee424712a67e7d1a7eaf584137443f7f4b9d821380ea5f08115d5ba14a5915f52bd81e4934037ef5ecb23b0e414d0dc81a99106268b9f05d63574c370454166e504d9f1de912e337e950e8a602d137f256cee3c5c246cc1f82d610ebcbb5c3a21b810f34cecb4b978fdd0226810b7727e39e04a54308e51c6dce9754021a93a4be8119156ac64745befbdc0da6123a1cc645b8805de1e35dfbdc8451671617a9de9d14a2ae859d0acd624b4425ee8e761efda58652d9dcbc83e0fa2654cbc6a67b2dc4d6c570148a74556e7fd72abd0c68ead215d681e535a02f7bfd361eab16d9fcc5fa2d1a768d68cae4e7d5d497f20e34078a361005106e007cbc08c5bf32b61292ad9e7939e551f69d4e319bedc92e84a5f26d18292d87fa42daf46542b1ec5164c8f6b0cac201910516f5d7153fb40b78ac19d342f20df6bcf34ba7859746a7f788a972e60c458dad9065d50b54773bbf6071202e011b900653429a37bc97648f503a2183dabd785248155d634c63d450df941c71cac82e7caf72c958d1aefa80c95199df58922fddad0f4a8c4634345f9b93472cf856f162197fd872c1a71ff8f1c3b4a6e031c2705df0d708aaa08876a680e4e9a880d52da8dcbace36f2a68b24fb99de1503d2e1a390a353d83d579555f88e7f7dd6bb14606438ae05212b250ae29f01af1820fc10e7ddb507598227f34c9ca820add020553f13a8fcd53501e3e6465d2f58cfa32cd37e696f7e1bdab9ec1f4acee5b0e2ead6ef87166fa720eafc6178039b391d61b4d0ddc72bc71a6069e4d2a02b259aba2260290591bd9cdcbceef8d0a39166b37a03ce326ac0221ba862675718220bcb0453d8f996bf4e65deee3bacb074d23e978119835a19770f3b9a2a9537181a9ca12a528f24821e84e312115d7d043dbefc7f91736bbe5ce88342f643b0df67e10225b8dc93d35249ae777e16493f9764ebb6cbc98f8be4ba3890d428b641ae3c13b37a232cb0bd4472cb7b798683fcaeb453e1b2d5f74bcf2ce0b54ce49a27e3bd2347115a566dff1b40d43d78b3c8bb739f54744bd9ac83ecc6fcfd8c9c716327fe8793a46e24d678eaa67582f8154544ce8ac6f97bbc53bcc203e00f53f6f7f79a25e49c42f19f2a01aabe245430ba1494fcf00142bdf66be2971832173653805fe6b7c4f0c2477ae0713b6a100d708fba53373a9848d3edc1ff67d1204e6e7939358445fd6ec094e147b84eb5703c66f21d077e3cb2bb7e081cc2a7f24ec6a4da3206d4bee26ec0055c2b273d2f0f74b66a069b9d2f375825051f5339f888658117d81a6246055a694f3cd15d6fcdb60d7a30175234c36adc7899a65092daff2373622d1edb1fdbbc6a91a00889c39977ffddf87c905161e39544a803326f780c2590ac55c19d690b39487bc148362e496a7c46b9f1004648392a2edbcc4894e560fc9343ca6f3792a62ec0fdfa623b2fa9271b1a15a5bb6292264ab0a1f20013047d6c859fb7ed9ad706b3f1f6869b4b72633c3198ea2ea97f817938b494f2c2991d1b274d9f956c91af382e271d3135674039ebe40fe323001e0c8b664d8438b6296d3b7c2e194af05836744c22ede3a8b49f1fb65be0deaf2d68319f472cee098caf9e26af1cf60bb7fcc554029781a15ecdef1f4b5293a58851c1f851709ebcfbc4377aeb2651f5a9b1baed728c33b481993c7eef67c2c1675edd2874208f0710f065b813b2a589280e788e295c18a6cd7ba52d16b90651a1a9bba52beeeb06245f1601736472411248e5c12eef0a80904f093d44e05f4fe927e2a34a5ce725fe4f9802a077c55e8269c640b8fe5fafef8778fd03ff0cba5c706e390e15b552d6d7d85f887036dc18aa475e5546e2c5d975b854cc98a2e7bba1dbd4b4aae25ccdb9a931b42a02e7f73442f427344737e4f6c8aa3965926a1e4caa924f1cb8c80baf5ec25df98a98831722d1aa1b0efeb0a5298f38f01d2b00ab2d6c44bc13c845f791bfe15c8a9dd48198ebb4db28de0acf6c949191b30f3ecf3319d4627e39654e90379a2bc3ce10985f32880cc4d5f6940c0a67ac25b8c7c9ff2966abc2b8f97e07fd13d0af7a101cce1a8f673d97854ca220361bce68311b5c3f32038f1e7a8b5d14ee1c163179ded8ca19e158f2a1c18e4e59986991954c406e27b006e29af3960f98ae2f9b204797b05a58d6173d50845c6d7cf05f05d2fba13fdb71c2dd0e6397d9bf699d5b65f932d28514934a53672ac06c057a841bdcb6d6626b73722f3656bdd8d1ea627de91203fd155fa386abaa78fc632c15d3018a880d9443ca28c137e2cb0cc12a1b460ccd7ec5e0e426c4037dbf8cb0e333b814d1bd208c6b3545e17cd3c823dff1a2b308902f7605778f7ced8adc0b160d352dde767445fa321c0c2afe2362486cf7504a0ac9bf7351329f1bbd2be2da9bfeacb6c0c2ed4332103a24b29c7eef3c1522164a547758183563ddf280dce341bc15467d70ca462373513d2d268664f66f5fd7b4a5edec6aaaa96681c19f833ad72a3bb79e54b7d83c7975aa8e12424f39b2fa5b64877bd77285765a6f96fafd700cd0ea60e707a309970e1206186d7d6124fd58813f3d823c7a51df110b46160a2421be8c39f26154db8f33ad18c26add0ba6e0e2fcc27b6c7b361d27bb124521336eea2313af3b894b223d5be596dc13b989e8bc84cb4325c437ee8669319854552183d19bb7bd864d74b49ca45b2a910e5ab483fa01238a11791fba84c4bac6565eeaecfd30afa844a6f071d33f58015d6125ae593cc2dc5572bd6941aef2ff466d03d3d56ed2148f98a555aef9fc6ca9c8c5be72926dc1492b41de9d291ca95adf2912996ee9d816bf678f545e7c2d70f16e5b7b99b2b805e2f03c6555971044c155ee0a3b7ca144d42a50d237e26d5f36ff8d94e8c3e3a3269a6256db4278a05dbd145d0683d4855526d580b3c81800740e81e634aac440b2dd7a3733c9bd94288c77fcca9b972a9667118aea1fe1230679b02dfb81b0ae73f8c5426503d805bbacc37df0588a052965b94803aaf57b8c450261643397f7c8129c60b8917d5394faaa99922fdaff84a18be1ce2acb27da36161cef1fe846b97a2f21c037e16871c627f529387a48e94a091d01aeccc954734a8f84db5a2140091d87a641e28a6af6687981fdfabe217e7e935df5ffcdc532e3b7fb33d6914f245638e2b2113e66e95129a8d74e3e1df365bd8eccd0b1ea0f9f1710fe65c6a19c73a66194a90be766b455adb6bee203065384d14ce85a4e8b15615c6e1bbd01000c2a6d368f241ff9ecd0c6f9fe0755c3185192f1658eeab2346c763ce6b278d603b8c16fde5e7de4d8c70aa7fb016dd964de2ea3289449cd7964667544feac580694c5c1491cdba4ce680637fa2558020b07929eb5d36120343f5462dd015f99fcb34673b7c666ec2d0a046dcaa509ce2b0ade1ab67aab163ae81ccea92cde96add2f8d94fece56670097e43fa777a6692f28b9e43874954c3e97196b3b16510061c6223e13bb47887f9cb0e277c5f9befb363bafb6b72277a34bca7c232aca7e8af2cb24a215096ce9b7581814a45ebc9b16373c06bf2e9e3524d32e8c75dd7772a7855222e9cd70ccfc7b9420cb6126fb3fe63f10b3095c0f018890b30a06d480277d193555d2160843370fdb46257af0627dadf57e9dd6c7f3d88432a483360426e3c4c44b8fd4ba2564e53a61a082a6134efdfd0cdd960727ac2acdef2aa3eb9763ee7eaea37d8b5e108b91928fc2a3e763320801b6839b62be9db21c0bb58e74a0a3f1391757d3ac229e833273419af7c5e732bd4e7d262b4c8ae7d8384065fd39baede0723120483b3f84094f02197f1d9fd566696946b8a2ef26e703fa9f8f564a3ff340dd1b342fb9bdc171f5809c6589f6e81b7d9eb2c6205f08ffbfca845e10d8f661cc00c6397a646d43889b7daf7d9255867b3beba5dc83ac4750c89e945dc32321adf0d8ac87ad11267f579d8451f77a2e66790ab21db8215d49a16f4e1ed5c02990e41ed12482daf1e00a5f7779e588841d95cb80a024dd8b99091b8381845403a0714578cc7601eadf1ef0e3eed375358155ca1bb14f4428dae8cf5defac736812f0d2938a5b0e4452e10065e993675ff983524fdc6bb1935279874055740790839ffb02af030e4d90debd9af9929c5c5e1f477a9db60092bedda1e5bbdf110adaedd09b0c91b56e7633403fc30f7ac81877979c8b1a4989a84e7593bf6d8fa34fe9aa385544a717c473b97ab38041f684c261620fdfb7613d39e7d7e1e055aafc2dd59f7080fbebb06dac2fc5cb8a6a005dcda0dc385dd810a819029e4be8bc8703102b5d442a1576798272ccd2686f50450a33e79e0e21883579dba80d3ef29df339ed29d3a1e0588fdd1ef4d60837ccecae9b044f5d497cd2c574298eeef57dc4edd39544838a26bf40579a40b2f248d55473f54253896d76944316c8a0f5f27dc16e3c8cb07b240acefe7ea2b5cf67247973569451d2d47a6e19ab4f758d584cca521b12812c93c4e72545d401de6877788f3553964441c7b2725f4522711683742ca50f569348c21c9fe2b8acb702028a0b68fbbc695a1d973ebe61a2e8537688233e2daa0c2d9fb1a7abc114133ea2a847ea61506c9639146d6bec9799da30f4ffe53252f8fc24ffdf0a9f3ec2d1176a607748c93c51ada7571db63dcb9a58990d34d5776fe19fc5b8d804a542034fb60f42445814a4f5cfccb2c023357a9464c3e1b90003a224ab03c28028bc8140c95a4c22d361badcddfde7fb3", 0x1000, 0xffffffffffffff40}, {&(0x7f0000000240)="4ea8243067f156a21596aca67319bd452b543ae2abd7260e31181dc211668c2d0fafae64a90f7077f0d3fdf166de9fa1c9358edd43ecc56b38605adf6219641ed23f1d80f23d3832313cd6a86f8ae2a35af4878b9a9e7b25fade035053", 0x5d, 0x43e713f8000000}, {&(0x7f0000001580)="5d47aa3c6d09f357be928317c182ffc4c5610cfb7d", 0x15, 0x2}]) 12:06:38 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:39 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:39 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x60, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:39 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000900)='stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000280)='system.advise\x00'}, 0x30) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 785.082672] hfs: unable to load codepage "none" [ 785.087535] hfs: unable to parse mount options 12:06:39 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:39 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x68, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 785.207078] hfs: unable to load codepage "none" [ 785.218383] hfs: unable to parse mount options 12:06:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/stat\x00') mkdirat$cgroup(r1, &(0x7f0000000040)='syz0\x00', 0x1ff) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 785.265134] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 12:06:39 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:39 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x3f000000}) 12:06:39 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$sndpcmc(&(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', 0x2b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000e40)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000000f40)=0xe8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000700)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000900)='stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000280)='system.advise\x00'}, 0x30) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:39 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x6c, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:39 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x800, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000040)=0x4c75ba1c, 0x4) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000080)={0x2c, @multicast1, 0x4e20, 0x1, 'dh\x00', 0x6, 0x0, 0x33}, 0x2c) 12:06:39 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x0, &(0x7f0000000940)=""/193, 0xc1) [ 785.517210] hfs: unable to load codepage "none" [ 785.524637] hfs: unable to parse mount options 12:06:39 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x74, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 785.645411] hfs: unable to load codepage "none" 12:06:39 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="240000002a0007031dfffd946fa2830020200a000900000006000000000000000d00ff7e", 0x24}], 0x1}, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) [ 785.670886] hfs: unable to parse mount options 12:06:39 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r1, 0xc040564b, &(0x7f00000000c0)={0x1e, 0x0, 0x301f, 0x0, 0x401, {0x101, 0x9}, 0x1}) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f0000000040)={0x0, 0x1, 0x3007}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x200, 0x0) 12:06:39 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x40000000}) 12:06:39 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x0, &(0x7f0000000940)=""/193, 0xc1) 12:06:39 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x7a, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:39 executing program 2: r0 = socket(0x10, 0x8080e, 0x2) write(r0, &(0x7f0000000000)="2400000019001f0014f9f407002c04000a02071008000100ffffffff08000f00ffffffff", 0x24) 12:06:39 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480), 0x0, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x100) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000180)=""/4096) r2 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x400000) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000000c0)={0x24, 0x0, &(0x7f0000000140)=[@register_looper, @enter_looper, @acquire_done={0x40106309, 0x0, 0x4}, @decrefs], 0x0, 0x0, 0x0}) 12:06:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000001}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x80, r2, 0x0, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DEST={0x54, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0x13}}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x800}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xffffffffffffff42}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x67}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x80}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x101, 0x0) ioctl$VIDIOC_S_FMT(r3, 0xc0d05605, &(0x7f0000000040)={0xb, @vbi={0x9, 0x5f, 0x80, 0x7d76775f, [0x0, 0x2], [0x100020000, 0x819b], 0x108}}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r4, 0xe1}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000480)={r5, 0xf3, "22980330be02b9196e6edd06360fe397a416755399c2660ef9528eadd6b58d90df9df5e0e4efa37387b907352a3cac63db6a08eca153a51f419d593cfd2efd1680f60ce31d956a043549f1bf7cdb640301852ba39ba4e0535f3ef8a53851a9a70a26f1392a2cde05bc087a2a18db5ec77731fe42302ce0041af872a6297d24e104d1b506b1b85914619cacbd4a8da4792847f91d18bf868a47ce91722b62c9bcddebbc98429e3d4121ec114a2c83d712195df2af736e87b9266b8bd4ccd195cfc642eb4b068733e6a78810eff874bc0835d7f44d03cb77084023032b15e31007bb5fdee6eab29e9502bfb910cbe43c2b5605bd"}, &(0x7f0000000580)=0xfb) 12:06:39 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x0, &(0x7f0000000940)=""/193, 0xc1) 12:06:39 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x300, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 785.974125] hfs: unable to load codepage "none" [ 785.985224] hfs: unable to parse mount options 12:06:40 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x5, 0x101000) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_raw(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{0x0, 0x2, 0xfffffffffffffffa, 0x20}, 0x5, 0x1, 0x0, 0x0, "6268a6c0b6a2dd19dac8ee7d3fdfe8e6bc12bdd8fa8588dab3c0c085a8a56a18e3df5a669681fb797e6a3e079a4e4456e62491c1f0510ba9a31f9c48b4ee1174"}, 0x48}, 0x1, 0x0, 0x0, 0x1}, 0x8000) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, 0x0) [ 786.113812] hfs: unable to load codepage "none" [ 786.124602] hfs: unable to parse mount options 12:06:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) getsockname(r0, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @initdev}}}}, &(0x7f0000000080)=0x80) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f00000000c0)={0x6}, 0x4) 12:06:40 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480), 0x0, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:40 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x8cffffff}) 12:06:40 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x500, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:40 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, 0x0, 0x0) 12:06:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x21, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x77, &(0x7f0000000000), 0x8) close(r2) fdatasync(r1) close(r1) 12:06:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-arm64\x00'}, 0x18c) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 12:06:40 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, 0x0, 0x0) 12:06:40 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480), 0x0, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:40 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x600, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) syz_open_procfs(r1, &(0x7f0000000080)='net/stat\x00') ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000000)={'nlmon0\x00', 0x7fffffff}) [ 786.439502] hfs: unable to load codepage "none" [ 786.444305] hfs: unable to parse mount options 12:06:40 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, 0x0, 0x0) 12:06:40 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x2000, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f00000009c0)={0x0, 0x0, 0x7f}, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000a40)=ANY=[@ANYRES32=r2, @ANYBLOB="7f000000dc6ab657da13d29d98b32ddf9b9933efacf5119e2bf27cf08e4a7ba2dd7fae2545c03aa981b0e227f5a76cfd9ef55928f7324cfdd283da7ce9a348961f299b65c4c25d5e144f8b5179cff9c0bf2d654cb6576b924555e8733b2dcba7e48d0e1dab31959048b7567aa7725bc62c63d25fdaf2e8f85df6fc6635def37907bdb2"], 0x0) io_setup(0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x4, 0x0, 0x5}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) openat(0xffffffffffffffff, &(0x7f00000007c0)='./file0\x00', 0x480000, 0xa1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28320, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x101000, 0x0) close(r4) syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x5951, 0x1) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@int=0x3, 0x4) syz_open_procfs(0x0, &(0x7f0000000900)='fd/4\x00') ioctl$KIOCSOUND(r3, 0x4b2f, 0x1ff) [ 786.619560] hfs: unable to load codepage "none" [ 786.624401] hfs: unable to parse mount options 12:06:40 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:40 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0xc0ed0000}) 12:06:40 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x700, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) io_setup(0x19, &(0x7f0000000000)=0x0) io_destroy(r1) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 12:06:40 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480), 0x0, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:40 executing program 2 (fault-call:2 fault-nth:0): sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:40 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0xa00, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(ctr-twofish-3way,nhpoly1305-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x101, 0x101040) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000040)=[0x3ff, 0x2]) 12:06:40 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0xf1a, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 786.964520] hfs: unable to load codepage "none" [ 786.970878] hfs: unable to parse mount options 12:06:41 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480), 0x0, &(0x7f0000000840)=[{&(0x7f0000000540)=""/67, 0x43}], 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:41 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x1020, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 787.097086] FAULT_INJECTION: forcing a failure. [ 787.097086] name failslab, interval 1, probability 0, space 0, times 0 [ 787.123272] hfs: unable to load codepage "none" [ 787.139759] hfs: unable to parse mount options 12:06:41 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 787.186443] CPU: 1 PID: 3649 Comm: syz-executor2 Not tainted 5.0.0-rc2+ #31 [ 787.193599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 787.202982] Call Trace: [ 787.205590] dump_stack+0x1db/0x2d0 [ 787.209252] ? dump_stack_print_info.cold+0x20/0x20 [ 787.214281] ? finish_wait+0x25a/0x490 [ 787.218183] ? find_held_lock+0x35/0x120 [ 787.222261] should_fail.cold+0xa/0x15 [ 787.226170] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 787.231296] ? ___might_sleep+0x1e7/0x310 [ 787.235460] ? arch_local_save_flags+0x50/0x50 [ 787.240079] __should_failslab+0x121/0x190 [ 787.244335] should_failslab+0x9/0x14 [ 787.248157] kmem_cache_alloc_trace+0x2d1/0x760 [ 787.252843] do_syslog+0x5aa/0x17c0 [ 787.256477] ? __sb_end_write+0xd9/0x110 [ 787.260579] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 787.266237] ? log_buf_vmcoreinfo_setup+0x120/0x120 [ 787.271263] ? lockdep_hardirqs_on+0x415/0x5d0 [ 787.275869] ? finish_wait+0x490/0x490 [ 787.279825] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 787.285199] ? trace_hardirqs_off_caller+0x300/0x300 [ 787.290318] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 787.295096] __x64_sys_syslog+0x75/0xb0 [ 787.299100] do_syscall_64+0x1a3/0x800 [ 787.303000] ? syscall_return_slowpath+0x5f0/0x5f0 [ 787.307940] ? prepare_exit_to_usermode+0x232/0x3b0 [ 787.312970] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 787.317833] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 787.323028] RIP: 0033:0x458099 12:06:41 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x1a0f, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 787.326224] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 787.345141] RSP: 002b:00007fc4ea071c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 787.352852] RAX: ffffffffffffffda RBX: 00007fc4ea071c90 RCX: 0000000000458099 [ 787.352862] RDX: 00000000000000c1 RSI: 0000000020000940 RDI: 0000000000000002 [ 787.352871] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 787.352879] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc4ea0726d4 [ 787.352888] R13: 00000000004c65ff R14: 00000000004db848 R15: 0000000000000004 12:06:41 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0xf6ffffff}) 12:06:41 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:41 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x1f00, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:41 executing program 4: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_G_AUDIO(r0, 0x80345621, &(0x7f0000000080)) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f00000001c0)={0x77, 0x0, [], {0x0, @reserved}}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x10, 0x3, 0xc) open(&(0x7f00000000c0)='./file0\x00', 0x400, 0x50) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000c0607031dfffd946fa2830020200a0004000100121d85680c1baba20400ff7e", 0x24}], 0x1, 0x0, 0x6c}, 0x80) 12:06:41 executing program 2 (fault-call:2 fault-nth:1): sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000040)={0x0, 0x7ff, 0x2, 0x4, 0xffffffff, 0x42a, 0x0, 0x7, {0x0, @in={{0x2, 0x4e22, @multicast1}}, 0x12, 0xfffffffffffff87d, 0x8, 0x2}}, &(0x7f0000000100)=0xb0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, &(0x7f0000000200)={0x5, 0x34325842, 0x3, @discrete={0x7, 0xfffffffffffff635}}) getsockopt$packet_int(r1, 0x107, 0x1f, &(0x7f00000001c0), &(0x7f0000000240)=0x4) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000140)={r2, 0x2}, &(0x7f0000000180)=0x8) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 12:06:41 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x2000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:41 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x11, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x3ef) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000000), 0x1}, 0x160) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000000)={0x9, @remote}, &(0x7f0000000080)=0x12, 0x80800) getsockopt$ax25_int(r1, 0x101, 0xf, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r2 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x8, 0x420880) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f00000002c0)) ioctl$SIOCX25SSUBSCRIP(r1, 0x89e1, &(0x7f00000000c0)={'bridge_slave_1\x00', 0xe1, 0x7}) 12:06:41 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x0, &(0x7f0000000940)=""/193, 0xc1) 12:06:41 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x2010, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 787.676314] hfs: unable to load codepage "none" [ 787.682759] hfs: unable to parse mount options 12:06:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200040) ioctl$KVM_GET_DEVICE_ATTR(r1, 0x4018aee2, &(0x7f0000000080)={0x0, 0x7fffffff, 0x10000, &(0x7f0000000040)=0x1}) 12:06:41 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$PPPIOCGMRU(r0, 0x80047453, 0x0) [ 787.787117] hfs: unable to load codepage "none" [ 787.795771] hfs: unable to parse mount options 12:06:41 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0xffffff7f}) 12:06:41 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x0, &(0x7f0000000940)=""/193, 0xc1) 12:06:41 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:41 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80000) connect$rose(r1, &(0x7f0000000080)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, 0x6, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x40) r2 = dup2(r0, r0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f00000003c0)) 12:06:41 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x3f00, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:41 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x4000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:41 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x0, &(0x7f0000000940)=""/193, 0xc1) 12:06:42 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x4800, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:42 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x3, &(0x7f0000000940)=""/193, 0xc1) 12:06:42 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) close(r0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x7b, 0x600000000000000, [0x140, 0x0, 0x40000020], [0xc2]}) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x200, 0x0) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0xf) 12:06:42 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x4c00, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:42 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x40000) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)=0x0) ioprio_set$uid(0x3, r1, 0x3) [ 788.137610] hfs: unable to load codepage "none" [ 788.148793] hfs: unable to parse mount options [ 788.294239] hfs: unable to load codepage "none" [ 788.308160] hfs: unable to parse mount options 12:06:42 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0xffffff8c}) 12:06:42 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, 0x0, 0x0) 12:06:42 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x6000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:42 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x13, &(0x7f0000000040)=0xfffffffffffffffd, 0x4) close(0xffffffffffffffff) 12:06:42 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000080)=0x5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x3, 0x2) ioctl$KVM_CHECK_EXTENSION_VM(r2, 0xae03, 0x2) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000200), 0x0}, 0x18) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f0000000040)) r3 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x20841, 0x0) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000002c0)={r4, @remote, @multicast1}, 0xc) 12:06:42 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x4, &(0x7f0000000940)=""/193, 0xc1) 12:06:42 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, 0x0, 0x0) 12:06:42 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x6800, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x2, 0x10000) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f00000000c0)="af038ba374af7268c66a75fdc61acb276b01c72b9f946ff6b6bbb8a5d5a7998ada346e0ca8f80c2733290c1d35f3b7b4a0f212ce5238cf8cb7fad35e283d9c31d46cd1fb3e06782115a8b8e3", &(0x7f0000000140)=""/84}, 0x18) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={0x0, 0x100000001}, 0xc) close(r3) close(r1) 12:06:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) socket(0x10, 0x0, 0x2000000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_open_dev$usb(0x0, 0x1, 0x420000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, 0x0, &(0x7f0000000500)=0x24) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000800)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f00000001c0)) ioctl$FIGETBSZ(r1, 0x2, &(0x7f00000000c0)) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000200)=0x3, &(0x7f0000000780)=0x1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r3 = getpgrp(0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000280)=r3) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000480)={{0x0, 0x0, 0x2}, 0x20, 0x0, 0x6}) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000340)) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f00000005c0)=0x3, &(0x7f0000000640)=0x2) r4 = socket(0x10, 0x802, 0x8004) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000980)=@sack_info={0x0, 0x800, 0xe86}, &(0x7f00000009c0)=0xc) getsockopt$inet_sctp6_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000440), &(0x7f0000000580)=0x8) tee(0xffffffffffffffff, r4, 0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) syz_open_dev$vbi(&(0x7f0000000240)='/dev/vbi#\x00', 0x2, 0x2) openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'team0\x00\x00\xff\xff\xff\xc0\x00', 0x4bfd}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000a00)="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", 0x1000, 0xfffffffffffffff9) [ 788.632142] hfs: unable to load codepage "none" [ 788.640585] hfs: unable to parse mount options 12:06:42 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, 0x0, 0x0) 12:06:42 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x6c00, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:42 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0xfffffff6}) 12:06:42 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x5, &(0x7f0000000940)=""/193, 0xc1) 12:06:42 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000180)={0x7f, 0x0, [0x40000071, 0x80561]}) 12:06:42 executing program 1 (fault-call:5 fault-nth:0): socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:42 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x9, &(0x7f0000000940)=""/193, 0xc1) 12:06:42 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:43 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x9, &(0x7f0000000940)=""/193, 0xc1) 12:06:43 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x7400, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:43 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x8, &(0x7f0000000940)=""/193, 0xc1) [ 789.141913] hfs: unable to load codepage "none" [ 789.151743] hfs: unable to parse mount options 12:06:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) socket(0x10, 0x0, 0x2000000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_open_dev$usb(0x0, 0x1, 0x420000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, 0x0, &(0x7f0000000500)=0x24) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000800)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f00000001c0)) ioctl$FIGETBSZ(r1, 0x2, &(0x7f00000000c0)) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000200)=0x3, &(0x7f0000000780)=0x1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r3 = getpgrp(0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000280)=r3) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000480)={{0x0, 0x0, 0x2}, 0x20, 0x0, 0x6}) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000340)) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f00000005c0)=0x3, &(0x7f0000000640)=0x2) r4 = socket(0x10, 0x802, 0x8004) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000980)=@sack_info={0x0, 0x800, 0xe86}, &(0x7f00000009c0)=0xc) getsockopt$inet_sctp6_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000440), &(0x7f0000000580)=0x8) tee(0xffffffffffffffff, r4, 0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) syz_open_dev$vbi(&(0x7f0000000240)='/dev/vbi#\x00', 0x2, 0x2) openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'team0\x00\x00\xff\xff\xff\xc0\x00', 0x4bfd}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000a00)="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", 0x1000, 0xfffffffffffffff9) 12:06:43 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffe7b) r0 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xb25, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000140), 0x0) pipe2(&(0x7f00000000c0), 0x80800) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x2, 0x200000) syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x3, 0x2) r1 = openat$cgroup_ro(r0, &(0x7f0000000580)='io.stat\x00', 0x2761, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 12:06:43 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x3, &(0x7f0000000940)=""/193, 0xc1) [ 789.276487] hfs: unable to load codepage "none" [ 789.282751] hfs: unable to parse mount options 12:06:43 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0xedc000000000}) 12:06:43 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x7a00, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:43 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x4, &(0x7f0000000940)=""/193, 0xc1) 12:06:43 executing program 3: clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x1000001, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xf9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00'}, 0x10) ptrace$cont(0x7, r0, 0x5, 0x8) 12:06:43 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x9, &(0x7f0000000940)=""/193, 0xc1) 12:06:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x40000000014, &(0x7f0000000300)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, &(0x7f00000000c0)='_', 0x1, 0x0, 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x109800, 0x0) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000000140)={0x0, @reserved}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000), 0x14) recvfrom$inet(r0, &(0x7f0000003b40)=""/4096, 0x5ac, 0x10122, 0x0, 0xffffffffffffff9b) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f000000cc00)=[{{0x0, 0x0, &(0x7f0000007e00)=[{&(0x7f0000007c00)=""/231, 0xe7}], 0x1}}], 0x1, 0x142, 0x0) 12:06:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) socket(0x10, 0x0, 0x2000000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_open_dev$usb(0x0, 0x1, 0x420000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, 0x0, &(0x7f0000000500)=0x24) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000800)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f00000001c0)) ioctl$FIGETBSZ(r1, 0x2, &(0x7f00000000c0)) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000200)=0x3, &(0x7f0000000780)=0x1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r3 = getpgrp(0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000280)=r3) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000480)={{0x0, 0x0, 0x2}, 0x20, 0x0, 0x6}) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000340)) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f00000005c0)=0x3, &(0x7f0000000640)=0x2) r4 = socket(0x10, 0x802, 0x8004) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000980)=@sack_info={0x0, 0x800, 0xe86}, &(0x7f00000009c0)=0xc) getsockopt$inet_sctp6_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000440), &(0x7f0000000580)=0x8) tee(0xffffffffffffffff, r4, 0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) syz_open_dev$vbi(&(0x7f0000000240)='/dev/vbi#\x00', 0x2, 0x2) openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'team0\x00\x00\xff\xff\xff\xc0\x00', 0x4bfd}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000a00)="f8caa0425eeebc4c3327078fe67e8c0595d0e1b7a21f6a4c357af75996e7e4584e96a80da65f4067bec129864960cd7972bc91dd74ae012d4754b634811ba0a32ff0df2c34b9d920cda6bce4b5925a7310f35592501653ba0e7d96e197e47c4f7a2edd10bfbe8fd49bbb88fd59a3d1f8ad70576063a8afdca2c605412e2df00f0e9dc2442eae3a0ef3a9e0d86e3d3a89a83764aa1b9abbbfe298451be6a17f9fade74fa54cc65e4be280a5c6130dabbe51f185e370e83248fd470b498c625068c3a790592a5daa4c205bc7c26e8f8597f0ea59eabe7ab447ac047e63cef062e571d18b88400552c22ca8da6c1f5a31d94a397a255a6480dbacd1065ef6edabc8491b4c574d5ec4191ac14c7503052a0fe837e3fe1df6d4dec57713aed48de8476bf78d4a89bf42b8d157951c6ba9049a2fc722a0883b854c418e617a447a751c8ffd31b27eac3e6a50f6c37420453fd30b295d80be98ec14f045d2d40af74e8934a34be5396f1aa4c47b374de55897ab84b26631a840dc042578a90048d35fcee5148fa91e4f2408283d135b49672b8f1b6159f5bf0fa501b2d21038c34470bd1326b04510530ee2c39cd1abc961331107680db09c227df15ac2c2f7bd1b75ee2d424521522146ac4a9e0a0a919c693a03f483cea2895d6ecc16c008620b8a556b604202eb3814c9753f98cf4316a8c95ca575aac2818ec39f24fb6eaf448f3a283068f169c55ae57d4cc6d07a3f5fba7e78fe27bfd988c98cefe2317085a72b69eaeee5b59837574b7f506ebb79784d036a00bd7d24f25dfff4f513feab1648d228a24c4c04b73d9f7dac7a946421df28e17c2084523397065f4ae0d8270d389eac6cbc6e7ae5203bf8d5b85396fce45a165aee05a3bc4f1fbbd5ce35cab0e5422dbf0c90e9a89ac54efff260164cd28b76f203571f7d6b5cdf719577e90b5a7ffb8e8dae982f72a86fb7c5cb1db780b069b9015b640d1c60597d689046b1ad3fe478cc6f2bf619ace3bf1c9b8f13235e85a2a9c902fee97250df393881ac78d7c538b27cdc975018adee2f459d94338ccf0a5d9da7f7f662bb5b7f70c3b556b1ab4ac27020cd714445ea0f7c5b02e12bae14d8d99b0e572d88955233cba722620ed228846a25a82454b250c0f51d9815c2d5ad5f69dfe35ccae31f5e1d5eea1e8ef241c3d0e61f05d960156e2f8460814c4efdb1cde0630fa6dca2683f2d6afb7439c97e496b4d5853d44de50336f67081aa89b24259aa974ea7aa453bde68dce760e3ad485b8da7b4d841783964e0ad64cd47481535e92926c8446cd632dcd0bd2970b09589cd61205392dab7bc1683dc7c4c269bad20b87a43c1bd19a7ec24fc4ff2717508d19898a763c027f1355fa516210c4b301c9155e408effa5ef937ed2ec0f8ed0a262686ac29a06311c8da31baf8c122de4a2328e6b173b55ba85a3d141bb0ac89bb92336724e0a4d4bcbfbe5ce6e4ee122833063da82af249302371d067fa1f4858f6389327ef9c05ab17e6dd74b2e1d9f2bee55c155b4b4a88f857c5c1e674335523f599263507e7ba8f9438b4c35294864301470f59fd69ad91e93eb7c20bb25dafd57657e2c7faace3f99cf8a20712f83d3a8445d38c2ea0e05f666021e99aa52ae8bd6223be88e1d2dca5de08a0a55a829cc7d6ec8f81370850b1194cff53d567d5a15ca98eb65bbe4cddaec3e32d902cab002cb9e8f05bc3ef99ebc60bbbe9198e339658bafe01027eea54952dc5278d6d66dc2d700d34631fb2a60ab5e6f56b9147451f3ccde96f29f086e075586706971b2312abbe90c368be6991f19486b9daeeb1cf2b360b12133f707fbdc8ea15109bf76b925114a1388acc12db07be0cf323d8373e16a7b5c61a9969f809baa9d671cba89c15dc7050985a504a31f19fad15a1b3f07ed75803b46368dd6a95117e740ae9eb5e9966da56a9d590c3d8cb2e11c46b5cdf955ca5c21753d062e0e64528a9228aea5cbbb5222063c7af374cf08b443af0254363b60cc6ca01cdf66f0d071c8082a8a66fc51e68aeeec0ab33e2b1360671f00283574d62e72d62627b4378099cd6f8b1d0f7155bf72f3185e401f9e62ff0de61dc6d794c2d20b65238c03879d13622dae96362989cf1bb6cdc65aedf169250ba993067fabc3f9e101c33d5b41b52189da6999aa01b6a43ba87592af6dbcfc2426d40b4e5043e114c00fd9babca76175a076105b0e5888f6182bc745b1f5dc7b1bab759971843f89914f0fb13d395374e94e4861386731f2f4055ff122fba64ef0d2b48597c2e945419855f88570e99d9156c1e640ff298fdc879a355aebea81d57c3c13b97e8b9f6df08d63bb7b48c02062c0dbd379b295918796c174627350142982ad4013cba6e1ca805e79085791d9b2977f23afd57f0eb08343d23683d383ba87ae1ba427403ad7bf20b346f1f81ecc10f0f6d998a1237f19b5bd19782dcab6df0b76209276ec06846cd725d91bfc043cd9a36c8c5e03af5235b375918f5b78e416b39414c3d08a43c9b6e97c9590b4a4ab3fa0f1406e5be907e42d2aed6ea84475e8449fa70668885e3dfcb2a8532062b7bf1bf282ada3493f466c8771ad9f2b59bdeaaaf1ccfe999a1cc2d912ad06c5e644cfe38632a5c351b4fa07fa778856a6789dfda25c75c7911beed4a2857cc94d94a10b44e2f07372eb48e1aabec54dd9e22d8dcae0e63710ee700d34a56e18fd4169fa7c5ea02e10e7acd5c42c821c676b64056d32f8a4415b35b03a651daf27a1e332d591b314ab9d80e5dd120508cdfd0a592686e60131e298201a312915250727e1b4032be405d6713057c27afd962e0d07a7057609abde5bbf33e92cd8d537f1241735f4cad81be97a1f475cc09979c03bf34ee4211a4dde00087bbd5f7f059f9ed7f20bada420d5e9a4db058ad31e15c728f4a5ec82d553b847fceffdf3e8db5cfde715f6eb5d4bd2c06f3ab52589ba71260eb12ad652a88a3607d3c8b528d99178c827ec8af341de72a5b38671aa3eb0f55970010516d683e2641122686d1cd99627ff15354e08030b8680cb198185c5db54bcab301a4cce8220cf205c226b1395f6a82bf906bafb18d02af78a7170e38bbb5e516b4a4b11bf1274f354de9d66f97282e9c74cf184b11d199346ea9b38847df7bbaa2c772e8723e3fb49bd169a35be112b6c1ddd1a05867d4cce9382b75fa4909f9f712f4160ca9346d11fe0a2a93e9c378e0e41bbc36d6bca28f903a815d1c65343d0738b53d1decbf4495f3f3ab3d2280350c1b183c3035b6b233cefd9afb13c60eb22ce0870ebf681bcb6b6faa81e5b999c4d81730ecbeb74248b4238f47b82de113657ded49c046892161884d550e6ee5bf437e5aefbea7c594d9d72030be1a3647fd76f374a6ec612ab8f1f413277e53231b3e28aa8871aacfcc3dffeb04d532200a0662bf9387a357408738e9debe19ca1ce6c114c28ee36dd6cd094804238bbdfcda82fa6013c5a650726217ea0065552359937691b6be2cc4fb37f3a2405b621a40a3dd65737f7f5e01b74f16a96f30e21dd4c71bddd773ae17b1bf52209dc1b01bf63af6a8e389dff05ffd2a1774c56e37df2e6faa235155dd591d2ed82b3ce8c10d11c837c0c2be949d8f661e0c4c6409d68daacc90ea285c620b5040a9b70ebf2bcd828628304e0e2f583b712d22b7a80737e82248ec45dcc60a1ca29e54b816aafd79123755892783dcf439ec79b45af2b95358e28ce095769067b24cc5c0cb392fe7af01be8159f8da0b012795e24a274b22d8cdbe9d483b53db55d48ea89b0d288ac6fe5f9eabaf5f59b9a9ef4d11f90e12ec234b6aa0724a9743e9a26d7d63fea0141b7d8462508711b458a9a52736ba627bb7b0b5a50963283b6ecd94499aa69c17888bc6277b2846f720dc92d2a8af8ffd8bdcdc134d8203184e3b18042ac6ccde0388ad0d82337ee38c4d733d1da6b29ec0f2c19ba54413dfbb25e05f5e2e63bd94f9c1ec0688baa3a74487f992a74637e0744b0673184a09e67e34d6481542469ef98d833e74c1111d7b586626009a6cbf54a54858385233832238c4523ca4f9215316d8c68982fc86ba10efec669f09a271d6e744e8103240242ef278df7998edd6808bd399109dbf67defcfb6fe699e2cfbc1b540ba019b453756a59e7b33da3382e48c9200c751aaca6d887cbe0cd0fb2832ef2678d3acc0e6c3a5aba549b0d85d3b7f681b97c032c21c86c22a565a8f454a5920fa148fc5520989cdca6c4a66fa1aab931e27c5f8a0cbdf4221746e754c9c6127ffd78182be2f5923b373255cc6314fd2c401de36a21da19ec54b04cd956b75686570aa18927f5387eb97744106424b390457835df7f74d6efe522e959f5f8e0a8c81505c1842ad7f71ac5b63e7602568ac1b939c89c099e63f219b94d113e4291955fd3ce964ea11da87ef59f4405458250c6f8f25918f2c1e7c74b76306ff6f462ae396e7b1e01b59d60cc61057377ab061c7fa52d047f22ac09821532e29723daba55cd260aca7df50fca30deeb73907cce3c6cfc7da1420afc29e915f453e5c2abc9d2c351d601dd172298da060ae7a179b481695ff4ae123727ee1b4a475e340641c3f75af854d1a724294d4d7f9d10c8dddea047e3beb4748344b7dcfd9586b60b082519e57ee915a685ff78266b39a768653cdc03a4275b7dbf6cd55f94702ac050e885d9b901702dd13ba63e673bafb346b05db09afa7128fab66d87dcccb446c929191a73076daeb0807021279fe8f197942dda66f5a6a19351c38459a30ff552cdc6cf6b42f6a1675b9371c17421ac460cb4f454bb6870b63aea4a58620cecd952b747557e7cc10c6237f7b09809f3c0680dc547ed7dd51767798bc2b4ec9bb47c751ac1684a020f9871575835f835ad344d0a64eab56470793624c6c400f074304eba453b2b4f3fc2db7ed6e24965dac2b0b7760a8089f8801eee1b1ae29de373e13f6d46ff0da779eee458fbf46e20bff3cadfedb476e045a25820b7c41c5348f92f97fb58adb18c80fc0a0aa163b2e0ace4c64cf9c829b4f2dfb3a606b6d5a09796573f35e05176635719107357e11955a77f1fa9648276ceb5e0af3704d3df4c3a575fa0e0c9a4709f69582c3e52871d3c32baefc2777692f01f9fb713d48c266811994a7205a74ff0c576867a172de6b3241b8ed0f71eb11ac8cc16abd43c4433aecc0079d5daee7b90d197eb6b4d29a72c7768d5b70542dfbfc69dcb77eb3f05df0da4bc4b19bd044c7beeb537bd1ad90ddb2297144edb02ecb808c6ccfbd56ab3e3df54a875bfb9748cbcf34a8d2210a10d86a180aeb8d0e0851bb8e1f8c36655d7d6e28f6cf7caf5379987cbe8f303eb77c914408a1012be1250c1952a8971bfeeb7e455ccb933d5eff33018d0ea3b39932442c2a5df66bfb6d4732603b6adc2dd6e91a330bfda812c5b881f359445a88f6723fb9cbdc18c1f52364f3c11a9792643d3b2cff66bc6a98d16a51bc30befcbe2e498a5a20525206334646c6d9c26486075c2ef9cfe2ac6081d50b090cb906c1709dedb07e360f036d7629c06a0b494495f0c9d5d195678805d5b32ecdf2d1ff4fb2f4362ca474417611484689caf9a2518552826697fa8b83560a4c5a6fa85af370e0f9e17a85c714082fe8d851b037c8af2a7c09d770e654fd281f029261c54968f93bf171c8079954502d4788f1dcf9304b7a66968ea78dc20eebd0a53d2aced4909f7b97ee2d34e034002b56c367ad9adb2e26947b648fdf6e234ee5b7552275e8cf07ff7d6df6861678a2f", 0x1000, 0xfffffffffffffff9) 12:06:43 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0xedc0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:43 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x5, &(0x7f0000000940)=""/193, 0xc1) 12:06:43 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x40000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:43 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0xa, &(0x7f0000000940)=""/193, 0xc1) [ 789.848957] hfs: unable to load codepage "none" [ 789.853892] hfs: unable to parse mount options 12:06:43 executing program 3: syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') r0 = dup(0xffffffffffffff9c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000540)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) sendmsg$xdp(r0, &(0x7f00000004c0)={&(0x7f00000001c0)={0x2c, 0x5, r1, 0x23}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000740)="ca1735da29e885fd2662715e5fe3b35b133e5146e9f237ab4ae89d77e36248e0514fbcae87199330d2ca50aa65a46595aa1b0a526cd89ad920799dd9c536d0e95b0c8c856c1cd5567ca124044d545c9f063bb70d", 0x54}, {&(0x7f00000007c0)="021ab1f4798c853fb67dba83daf4d9c4ec1b712ed5a7bf7055588de8c55a01ebeb0a263e568859cfa21f9561dbc75996d43415518ff979e57d3c835157c447e5c14ebb44356dde58d1fb720edb3c91f9962eb9d0a9d5143a12dd234ddcbd60c9162e6ff42e14736a2a84dcb20e4e95853083dfc9eee04d0312188a58b251c4bb5c2d3ee26db5cd56f6d6d232428eda21b2858503524c637e7be42e8973abf31d93f3740966d92fc4058e8bd28f149fad0c7c63fb5e63dc46d1cf1d1c164d67da04decd61862dd8f3917ab7edac480dc7030a68b31e23a171ea2ceaa04d33424ed37bace4cf9a56e506", 0xe9}], 0x2, 0x0, 0x0, 0x8000}, 0xd0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000000d80)=0xfffffffffffffeb2) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000033c0)=""/137, 0x89}], 0x1, 0x0, 0x0, 0x2}, 0xca}, {{0x0, 0x0, &(0x7f0000003700)=[{&(0x7f0000003600)=""/253, 0xfd}], 0x1, &(0x7f0000003740)=""/165, 0xa5, 0x10001}, 0x5}, {{&(0x7f0000003980)=@ipx, 0x80, 0x0, 0x0, &(0x7f0000005c40)=""/4096, 0x1000, 0xb5d}}, {{&(0x7f00000070c0)=@sco, 0x80, 0x0, 0x0, 0x0, 0x0, 0x49e1}}], 0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000640)="ffe2111a584847b20e1d604ac85df245b9491501b54a7506a97fcf5b5e155e1258a204d12fd0c1510b88f32c692704654408eba3e8d05cb68db1d5ed0c71c8da23828463c05d0561d994370b3933aae26b22d331b66e7224b6abc404bd6016c71ecfe8859bce2a538630c2005a64e5d0340c17c4c9978797389af54c1ab885f7a1f08006b0cd4d344ba0a0309422f59eea76bc95b0d06abe86f298a93a85e7ae3f056c7bc11e1f2a6fd1f29a01b209b211e365bec7ba4e66ba41053462ee0d7edbe73455d0dfb90aba", 0xc9) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000500)='/dev/mixer\x00', 0x20021, 0x0) bind$xdp(r4, &(0x7f0000000040)={0x2c, 0x0, r2, 0xd, r3}, 0x10) r5 = accept$alg(r3, 0x0, 0x0) write$FUSE_INIT(r4, &(0x7f00000003c0)={0x50, 0xfffffffffffffffe, 0x3, {0x7, 0x1c, 0x800, 0x1, 0x400, 0x4, 0x6, 0x3}}, 0x50) ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f0000000440)={0x0, 0x0, 0xffffffff, 0x0, 0x8, 0x9, 0x1f, {0x6, 0x80000000, 0x690, 0x3, 0x1, 0x9, 0x9c0, 0x6, 0x0, 0x1, 0x800, 0xfffffffffffffffe, 0x0, 0x1f, "5222d646a51b84ba5c89a6d5425ad51843a2b08a466f06c9c056ca6cfb1406b4"}}) recvmmsg(r5, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl$DRM_IOCTL_VERSION(r4, 0xc0406400, &(0x7f0000000300)={0x7f, 0xffff, 0xfffffffffffffff8, 0xec, &(0x7f0000000200)=""/236, 0xfffffffffffffc1f, &(0x7f0000000100)=""/34, 0x6b, &(0x7f0000000140)=""/107}) [ 790.024887] hfs: unable to load codepage "none" [ 790.030117] hfs: unable to parse mount options 12:06:44 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x2000000000000}) 12:06:44 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x7ffffff2, &(0x7f0000000940)=""/193, 0xc1) 12:06:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) socket(0x10, 0x0, 0x2000000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_open_dev$usb(0x0, 0x1, 0x420000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, 0x0, &(0x7f0000000500)=0x24) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000800)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f00000001c0)) ioctl$FIGETBSZ(r1, 0x2, &(0x7f00000000c0)) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000200)=0x3, &(0x7f0000000780)=0x1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r3 = getpgrp(0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000280)=r3) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000480)={{0x0, 0x0, 0x2}, 0x20, 0x0, 0x6}) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000340)) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f00000005c0)=0x3, &(0x7f0000000640)=0x2) r4 = socket(0x10, 0x802, 0x8004) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000980)=@sack_info={0x0, 0x800, 0xe86}, &(0x7f00000009c0)=0xc) getsockopt$inet_sctp6_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000440), &(0x7f0000000580)=0x8) tee(0xffffffffffffffff, r4, 0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000400)) syz_open_dev$vbi(&(0x7f0000000240)='/dev/vbi#\x00', 0x2, 0x2) openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'team0\x00\x00\xff\xff\xff\xc0\x00', 0x4bfd}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000a00)="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", 0x1000, 0xfffffffffffffff9) 12:06:44 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x1000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:44 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0x4a) 12:06:44 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x9, &(0x7f0000000940)=""/193, 0xc1) 12:06:44 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x2000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:44 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0x20000a01) 12:06:44 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x9, &(0x7f0000000940)=""/193, 0xc1) 12:06:44 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x3000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000b40)=ANY=[@ANYBLOB="455eb091e5fb02a45fcbf99f04d700fef5ee6bf0e0a4ac9f424d96fbff6a32e1286eb3c7ad5269a445341954d4895f2b465c73970f7bd23bf3b1e0736602899f17bf3243d00069f73db261e3fe5719ee70dd17d277dd3954c3031659eab8d6efefa19fbc9994b5385cda56bfab0e6db6dfbd09b7c40133413d237b6ca811b383766c84bac528eb8f6ad1208ff55bba77fb9765cefabd69e19ba50098e2bf6e139854b45c09eb077e055ebef36d366d9f68cfbd08931d23950eb522d8a2f130dca588a09816695f997a6db27919311a9f8657b317543f57cadf9f25c360b1aaac7d1848ce047c723fc8a413d9cb2db8714f16961cd3"], 0x1}}, 0x0) sendmsg$FOU_CMD_DEL(r1, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f00000005c0)='rxrpc_s\x00', &(0x7f0000000600)={'syz', 0x3}, &(0x7f0000000640)="47f7ce779609fffc638a79ed1c9be2969e26b31595f91e23695a621276cab1b5147d5e5e867336eefe832db0db9f42e0fbc392498afbd2c18baf5ac1716c39b94bbce66d9571dc24aaeae2e52eaddac7db7abea219f096b7fed04dc78cc7", 0x5e, 0xfffffffffffffffc) add_key(&(0x7f0000000700)='rxrpc\x00', &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$dh_compute(0x17, &(0x7f0000000840)={0x0, r2}, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x0) ioctl$TIOCEXCL(r1, 0x540c) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000003c0)=""/67) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x6180, 0x0) openat$cgroup_procs(r3, 0x0, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/\x00\x00\x00\x0e\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) ioctl$IMSETDEVNAME(r4, 0x80184947, &(0x7f0000000100)={0x0, 'syz1\x00'}) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x400000000000000) getdents(r5, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f00000000c0)={0x44, 0x4, 0x9, 0x9, 0x9}, 0x14) [ 790.525809] hfs: unable to load codepage "none" [ 790.538382] hfs: unable to parse mount options [ 790.670670] hfs: unable to load codepage "none" [ 790.703732] hfs: unable to parse mount options 12:06:44 executing program 3: socketpair$unix(0x1, 0x800000, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x5, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket(0x10, 0x80002, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f00000002c0)=""/241) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000540)={0xffffffff, 0x3f, "4d227d5b379833c339015ce5608ec2316e608307205fc1f430bddcd7c3d4963a336ce18fca6eef1e571b6d49a7119b54462a7db746d38b343cfc105064aa3f"}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xffffffad, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) getpeername(r0, &(0x7f00000001c0)=@vsock, &(0x7f0000000040)=0x80) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='trusted.overlay.upper\x00', &(0x7f00000005c0)={0x0, 0xfb, 0x100, 0x2, 0x8, "61ba068a07b57f40497295553d48c632", "724fabb62568d67b2077c408bb0c637a68cf50a44fd1923d1177046f80ddae4f0ba4c60904bb9cff6dd21fb9cebd13785effa5df7333436e7871f268c1ebe5b713cc8a7e528051f6c483097b8ac7f3acf27eae7a5fe72948683ba1afab6c5c97f0bfccc2659bc8e58294c1ca0809d06d9e092a1b723cb7551e0650b4748eedd9d7ce5a6111cd50eddab84fa6849ac5ed6cec221eeeba574bef4956b447c9252d4a509619fb4ef5bedb4cea9dd1666d86d6a187ab371145254bed818c2b66c6b284ba54cf366b9e3bba98088e37b62d1fe3f7015fc2f4d46388fb5d7e2e666749dd9d2507563bf6faa29e9d"}, 0x100, 0x1) 12:06:44 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x3, 0x202141) setsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f0000000080), 0x4) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) ioctl$BLKROSET(r1, 0x125d, &(0x7f00000000c0)=0x8e) 12:06:44 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x4000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:44 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x8, &(0x7f0000000940)=""/193, 0xc1) 12:06:44 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x4000000000000}) 12:06:44 executing program 2: r0 = accept(0xffffffffffffff9c, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x80) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x18}, 0x1000}, @in={0x2, 0x4e22, @rand_addr=0x3ec}, @in6={0xa, 0x4e21, 0x7fffffff, @mcast1, 0x6}, @in6={0xa, 0x4e23, 0x1ff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x6}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000001c0)={r1, @in={{0x2, 0x4e20, @multicast1}}}, &(0x7f0000000280)=0x84) sched_setaffinity(0x0, 0x0, 0x0) rt_sigpending(&(0x7f00000003c0), 0x8) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000440), &(0x7f00000005c0)=0x4) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) gettid() connect$bt_sco(r0, &(0x7f0000000480)={0x1f, {0x1, 0x100, 0x6, 0x40, 0x100000001, 0x7fff}}, 0x8) write$FUSE_DIRENT(r2, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000340)="69e3bbc3c86d012fea3c4195c18e79f2e05f866d031b421401b256f9ba2eafd9eb467c01334e9fed9e3d66a120240edffe8edf69354ac69d985eb986fba562745e6f9e77ae8512ddfbab4ff80942e5c20f784d9266dadbb355443afafb0c6a3e72109c80425ed4", 0x67}], 0x1) 12:06:45 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x5000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 790.996483] hfs: unable to load codepage "none" [ 791.001403] hfs: unable to parse mount options 12:06:45 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x9, &(0x7f0000000940)=""/193, 0xc1) 12:06:45 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) signalfd4(r0, &(0x7f0000000040), 0x8, 0x80800) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0xfffffffffffff4ee) socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$SIOCX25SSUBSCRIP(r0, 0x890b, 0x0) 12:06:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000b40)=ANY=[@ANYBLOB="455eb091e5fb02a45fcbf99f04d700fef5ee6bf0e0a4ac9f424d96fbff6a32e1286eb3c7ad5269a445341954d4895f2b465c73970f7bd23bf3b1e0736602899f17bf3243d00069f73db261e3fe5719ee70dd17d277dd3954c3031659eab8d6efefa19fbc9994b5385cda56bfab0e6db6dfbd09b7c40133413d237b6ca811b383766c84bac528eb8f6ad1208ff55bba77fb9765cefabd69e19ba50098e2bf6e139854b45c09eb077e055ebef36d366d9f68cfbd08931d23950eb522d8a2f130dca588a09816695f997a6db27919311a9f8657b317543f57cadf9f25c360b1aaac7d1848ce047c723fc8a413d9cb2db8714f16961cd3"], 0x1}}, 0x0) sendmsg$FOU_CMD_DEL(r1, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) add_key(&(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f00000005c0)='rxrpc_s\x00', &(0x7f0000000600)={'syz', 0x3}, &(0x7f0000000640)="47f7ce779609fffc638a79ed1c9be2969e26b31595f91e23695a621276cab1b5147d5e5e867336eefe832db0db9f42e0fbc392498afbd2c18baf5ac1716c39b94bbce66d9571dc24aaeae2e52eaddac7db7abea219f096b7fed04dc78cc7", 0x5e, 0xfffffffffffffffc) add_key(&(0x7f0000000700)='rxrpc\x00', &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$dh_compute(0x17, &(0x7f0000000840)={0x0, r2}, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x0) ioctl$TIOCEXCL(r1, 0x540c) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000003c0)=""/67) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x6180, 0x0) openat$cgroup_procs(r3, 0x0, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a00)=ANY=[@ANYBLOB="520000008f2046034381b571e3a8030065c93d9b0ec7fec94e060000689a6093b10f504a6e32abd0dff5dbac26671d612f719947929d09cf6e93c49c5689a032ae62530a1ccbbf1a8960d066e52f8205a9869f208a5e26885b51d6cec5dc7d892cb3839e39a2d07f295dd66e8ac398dafa84fe1e0da05bf5e8af90bc8751404af80631d947e58c88e8d0d3511a29909a1c7ff74615d8f2b415434b5e5fb40cae3b1f88d1caeeb82f0480976eba8e61e573f8a0663b55babfef7e8113011c541376d8fbbefb716a8b5357cd54a134b6311f525a7fa799e67e66067f92824372216c9d49f3e98007aeace64b014775e2152a2e129f0b690c4e9b7b3ec7c5b3e872646bb6df6b45c1042f4a76733dc7df8cb1f04026de2202f797eccee34045879a448f752ecb59ed777d678f960553514cddd97193f4bb7f6656"], 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/\x00\x00\x00\x0e\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) ioctl$IMSETDEVNAME(r4, 0x80184947, &(0x7f0000000100)={0x0, 'syz1\x00'}) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x400000000000000) getdents(r5, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f00000000c0)={0x44, 0x4, 0x9, 0x9, 0x9}, 0x14) 12:06:45 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000200)={0x70001, 0x0, [0x5, 0x0, 0xf88, 0x6, 0x8000, 0x81, 0xfff, 0xb248]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000100)=""/193, 0xc1) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f0000000040)={0x1, 0x0, [0x101, 0xab, 0x7f, 0x200, 0x100, 0x1, 0x7]}) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000280)=0x10001, 0x4) [ 791.122278] hfs: unable to load codepage "none" [ 791.159170] hfs: unable to parse mount options 12:06:45 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0xa, &(0x7f0000000940)=""/193, 0xc1) 12:06:45 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x100000000000000}) 12:06:45 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x6000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:45 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x400000, 0x0) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000300)) ioctl$NBD_CLEAR_QUE(r0, 0xab05) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000180)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x34}]}, 0x10) [ 791.393708] hfs: unable to load codepage "none" 12:06:45 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x7ffffff2, &(0x7f0000000940)=""/193, 0xc1) 12:06:45 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, &(0x7f0000000040)=0x10, 0x800) 12:06:45 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x7000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 791.422935] hfs: unable to parse mount options 12:06:45 executing program 3: r0 = eventfd(0x100000000) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x5, 0x8200) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000000)={0x2, [0x0, 0x0]}, &(0x7f0000000180)=0xc) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0x8fe) readahead(r0, 0x9, 0xdb5) r2 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x833}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000100)={r3, 0x5, 0x2, [0x1ff, 0x3f]}, &(0x7f0000000140)=0xc) ioctl(r2, 0xffffffffffffffc1, &(0x7f0000000100)) 12:06:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x12002, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="6fbe8d9d39af3f97650ea16057f69796150afc418bc2894eea57032259ac"], 0x4) ioctl$void(r0, 0xc0045878) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000400)={0xfffffffffffffffd, 0x0, 0x0, 0x100000009b4b62b}) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0xd486, 0x4002) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f00000000c0)={'rose0\x00', {0x2, 0x4e20, @empty}}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17}) [ 791.533925] hfs: unable to load codepage "none" [ 791.547435] hfs: unable to parse mount options 12:06:45 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0x4a) 12:06:45 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x200000000000000}) 12:06:45 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0xa000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xf) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000000)=0x94, 0x4) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:45 executing program 4: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000080)={r0, &(0x7f0000000240)="705013c5f9a6e840f3be727854fef61b6548da78528e96ae5b8218bb4d0619c20ecb60049bc01016043b9d151f5a40f2a89a28f8adaad9c9d02053d1bfc058c03111ef3ab3e397d0dd14966c47b3eb1541f78c669f015cafcf8acac5afc6666d917aae7de128a86ea1e31d30cbc7627ce2", &(0x7f00000002c0)=""/197}, 0x18) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) memfd_create(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x4) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) unshare(0x8000400) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000440)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) 12:06:45 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x10000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:45 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000008a40)=[{{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f00000033c0)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffff9c, 0x0, 0x5, &(0x7f0000000000)='ppp0\x00', 0xffffffffffffffff}, 0x30) r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f00000000c0)='net/softnet_stat\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 12:06:45 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 791.795540] hfs: unable to load codepage "none" [ 791.805125] hfs: unable to parse mount options 12:06:45 executing program 4: r0 = socket$inet6(0x10, 0x80003, 0x0) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="5500000018007f8500fe01b2a4a280930a06000000a84308910000003900090035000c00060000001900150000000000000000dc1338d54400009b84136ef75afb83fb448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0) getresuid(&(0x7f0000000300), &(0x7f0000000340)=0x0, &(0x7f0000000380)) fstat(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000500)={{}, {0x1, 0x2}, [{0x2, 0x7, r1}, {0x2, 0x2, r2}, {0x2, 0x1, r3}, {0x2, 0x4, r4}, {0x2, 0x4, r5}, {0x2, 0x2, r6}], {0x4, 0x5}, [{0x8, 0x4, r7}], {0x10, 0x7}, {0x20, 0x6}}, 0x5c, 0x1) [ 791.921782] hfs: unable to load codepage "none" [ 791.926889] hfs: unable to parse mount options 12:06:45 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0x20000a01) 12:06:45 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x4, 0x4000) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f00000000c0)={&(0x7f0000000040)=[0x1, 0x80000001, 0x40], 0x3, 0x0, 0x6, 0x9, 0x2, 0x1, {0x100, 0x0, 0x7ff, 0x5, 0x0, 0x9, 0x8, 0x5, 0x401, 0x401, 0xfe, 0x5, 0x1, 0x2e033627, "7399c8dd88c7df0b0dc8856b0c053f69ff0936538d308f6321a58939d4a5eed6"}}) ioctl(0xffffffffffffffff, 0x81000008912, &(0x7f0000000440)="0adc1f023c123f3188a070") socketpair$unix(0x2c, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000480)={0x2, {{0xa, 0x4e21, 0x7, @mcast2, 0x376a46f6}}, 0x1, 0x7, [{{0xa, 0x4e24, 0x3, @mcast1, 0xfffffffffffffffa}}, {{0xa, 0x4e24, 0x1, @empty, 0x200}}, {{0xa, 0x4e21, 0x401, @mcast2, 0x2}}, {{0xa, 0x4e24, 0x2, @empty, 0x40}}, {{0xa, 0x4e22, 0x7, @mcast2, 0x80}}, {{0xa, 0x4e21, 0x7, @empty, 0x3}}, {{0xa, 0x4e23, 0x6, @loopback, 0x3}}]}, 0x410) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4) ioctl$KDDELIO(r0, 0x4b35, 0x20) 12:06:45 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x1a0f0000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:45 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x300000000000000}) 12:06:45 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x7) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000000c0)='*:md5sum*\x00', r1}, 0x10) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000000)={0x0, 0x6}, &(0x7f0000000040)=0x8) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000200)={r4, 0x8001}, 0x8) setsockopt$inet6_tcp_int(r3, 0x6, 0x2000100000000019, &(0x7f0000000100)=0x8, 0x4) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000080)={0x1, 'veth1_to_bridge\x00'}, 0x18) r5 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r5, 0x84, 0x65, &(0x7f0000000280)=[@in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e23, @multicast2}, @in6={0xa, 0x4e23, 0x100000001, @mcast1, 0x4}, @in6={0xa, 0x4e24, 0x7, @mcast1, 0x6f19}, @in={0x2, 0x4e21, @empty}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e24, 0xfffe00000000000, @mcast1, 0x8}], 0x94) ioctl$TIOCSSOFTCAR(r5, 0x541a, &(0x7f00000001c0)=0x2) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) 12:06:46 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x1f000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:46 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000000)=""/193, 0xc1) r0 = getpgid(0x0) ptrace$setregset(0x4205, r0, 0x7, &(0x7f0000000240)={&(0x7f0000000100)="819968c203bd89d385b23cf6c668c5bb77726baae9b70e374e761253c14e1a325b5e9e87da786624be04544577a1e4f22d0c46bd3f72ceaa1d8ad13bbea669999c71f9351f761495fe20d58e7bb67f9cafae3c9da2a0cc31bb8d44311922e129dabddf6b62cf843c204b1b30238187ebd0affa76f8a5fc529f3429ba0f8b776f8a8a25a19529cf712ed011746be7f8be863225fee3225067016b83ceb87d121e6c259a7c6b45a521cbafac59528e429c103f474a0756e410828f59a49d168fab7cd2d02a3ed9ef338b81f6ebdfc2e5e72ad67be43b92ec7c7dca6595ab5a241424a5057a12cfacaf8764b36a4b326e9fe020e41aaab7", 0xfffffffffffffee1}) 12:06:46 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) setxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f0000000280)=@sha1={0x1, "4239c3180ef28507d99a133d7ce2210f6f0caf1d"}, 0x15, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) r1 = getpid() r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) kcmp(r0, r1, 0x0, r2, r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r2, 0xc0106401, &(0x7f0000000180)={0x63, &(0x7f0000000100)=""/99}) prlimit64(r0, 0xf, &(0x7f0000000080)={0x80, 0x3}, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x40002, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:46 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x40000, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000002c0)="a5bc87ce012021b484f0faf696631b4b966a1d3a778009840d42", 0x1a) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) ppoll(&(0x7f00000005c0)=[{r2, 0x40}, {r1, 0x400}, {r1, 0xa021}], 0x3, &(0x7f0000000600)={0x0, 0x989680}, &(0x7f0000000640)={0x3}, 0x8) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x3e) r3 = accept4(r2, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f00000001c0)=0x80, 0x800) socket$nl_route(0x10, 0x3, 0x0) setxattr$security_capability(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='security.capability\x00', &(0x7f0000000380)=@v1={0x1000000, [{0x2, 0x200}]}, 0xc, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm_base(salsa20-generic,cmac(arc4)))\x00'}, 0x58) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000540)={0x4, 0x7fffffff, 0x1ff}) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000180)="ab553fec94", 0x5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, r1, 0x0, 0x1e, &(0x7f0000000200)='-systemposix_acl_accessproc\'-\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f00000003c0)={0x0, 0x86, "c6e6968e897c684b851da01a71a14e9b06c953daf3fd8ae75345e9c6f4ee9ec3d840ab851c7189dc72ecae802ae67523831a3a02f2547023de2f6bf7b08b10ba2ead4011ca47d83934fa09500df7c90b4fa655cf37f1ab0bc1391eb96e6990aa4b0b656b9e3b6538bce903514210a6e6df0a84cff2233d44e658c390afcdfc5feab916e612a0"}, &(0x7f0000000480)=0x8e) openat$md(0xffffffffffffff9c, &(0x7f0000000680)='/dev/md0\x00', 0x8000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000004c0)={0x8, 0x0, 0x9, 0x8, 0x8, 0xff, 0xfffffffffffff901, 0x3, r5}, &(0x7f0000000500)=0x20) ptrace(0x10, r4) 12:06:46 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x20000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 792.280283] hfs: unable to load codepage "none" [ 792.293914] hfs: unable to parse mount options 12:06:46 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x7, &(0x7f0000000000)=0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x2, 0x0) r4 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x101002, 0x0) r5 = dup2(r1, r1) r6 = syz_open_dev$mouse(&(0x7f0000000800)='/dev/input/mouse#\x00', 0x0, 0x90000) r7 = syz_open_dev$media(&(0x7f00000006c0)='/dev/media#\x00', 0x7ff, 0x0) io_submit(r2, 0x7, &(0x7f00000007c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x4431, r1, &(0x7f0000000040)="9e47c933a909f038023792c648ce6bcadc4dffce585aa2cb4b1141749c70125993d0de3cc392f65cb1a5550adf64da34e6b4ba59b50888889c83d2233125a5f2b15cfdfcd8d9081a17de4d9f9dfc1f1a180b590b559163984c6516db399862245ab5d6bfca67735f3cce4d6760e30af50384e1b1815fd2afe5f9edd26bc150457596bea8", 0x84, 0x0, 0x0, 0x1, r3}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0xb, 0xef, r0, &(0x7f0000000180)='/', 0x1, 0x3, 0x0, 0x3, r4}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x5, 0x2, r0, &(0x7f0000000240)="aa20f6b2ecc4b63124ad5c30aaf64b19ce6c4e7d89e3fa78bf498e9de7259d144537727b50e217e285e3e74cd4245bedd85bc2ea6a6a939bdd5f2a8c6537da3e909b6ec568ab6de27b7e5706b941eea0c01d728cfe29ea991cec0395d05ee81555dda7842469f762957dae0ff8bfb8ef79ff1fa224f995b8f19945bba41287eb78b25775b8c8547bf03f692edba75c3c722d37bb3d", 0x95, 0x8, 0x0, 0x3, r5}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x7, 0x4ef1b8a4, r0, &(0x7f0000000340)="3b327e15870b2a90e846382eca97688b584b7e19c399e4f0e1c6abd23f868dac9b4cba7ef96765cbb1637b51c06fc15814730fac7b58f9574a2a656eb700c90daedbb7dff604f9c6e68ec7b1d335bccb60607cc1294d4004450bd792ca3043f3590cb80faab66401daed5eaac8152276884944199aede942b4b36038dbcc60b70b480d2d3b5499dccbc1fb29e969803aec9a5e5f43255727434f7d4a8d0e675311dff09644ac084c823535ce325c9f83b2a32c98222d652b37f4251b5eb53e6b76f2e339d891796de8efcdfdd33758aa79ca59ebdcba9482a39077f05a1bc4bfaa340a28a72b94ccd002064f969f6deabd1768534eb1a98c37ae05", 0xfb, 0xfeaa, 0x0, 0x2, r6}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x5, r0, &(0x7f0000000500)="8972ceee7653791211e91bbf250ebfa66f54b931cd3e109f499e27d0a4620977938e2cd95929f9105e5b896b8a5ef4514e9d9ef48077e13360363c3ca0480ea047ed9c1ce844f2b0e0b430266ee22859c621e6242b6ceb678363c9458603a56bf975dba8", 0x64, 0x6}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x5, 0x80000000, r0, &(0x7f00000005c0)="6439e45e16f5ed454ed92f13347bb1bbc484bbd63baf131856ca0c183047f2a52e2099c9c9ac6765d8a687d63dfde39825b74b163f26b0ec3b5853596198b1968237de01342a6c5503470c3be4d3d6991bc66475f9c868480659ce2cf1e8b28c717f8d755168a48f50105c18fc4cf8bfd2badf51d44d5d85139cea7b0198fdc81163443f6bc58b363b7952cbb2926ca89e94861ac0c5e5fc253191cf3ee362c67dfa912f1c554ffa8420821ed78ee4342dd90d33a4d27f69d22886331cf9df84a7bddc09d859c82fddc7b00ffdf89fc895ebc62764e0d28dfdaef0c4f066", 0xde, 0x8743, 0x0, 0x2, r7}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x7, 0x1, r0, &(0x7f0000000740)="3bcd4158ec80", 0x6, 0x7, 0x0, 0x1, 0xffffffffffffff9c}]) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:46 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x20100000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:46 executing program 2: sched_setaffinity(0x0, 0xfffffffffffffef1, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) shutdown(r1, 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)) syslog(0xf, &(0x7f0000000000)=""/193, 0xde) [ 792.465125] IPVS: sync thread started: state = MASTER, mcast_ifn = veth1_to_bridge, syncid = 0, id = 0 [ 792.468591] hfs: unable to load codepage "none" [ 792.489213] hfs: unable to parse mount options 12:06:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000040)="24000000020107081dfffd946fa2830020200a000900120000090000000000000000ff7e", 0x24}], 0x1}, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) 12:06:46 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x400000000000000}) 12:06:46 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:46 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @netrom}, [@bcast, @remote, @bcast, @remote, @netrom, @netrom, @bcast, @rose]}, &(0x7f0000000080)=0x48, 0x80000) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f00000000c0)=0x1, 0x4) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000100)=""/193, 0xfffffffffffffcd9) [ 792.729013] netlink: 'syz-executor4': attribute type 18 has an invalid length. [ 792.773598] hfs: unable to load codepage "none" 12:06:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x400000000000004, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) listen(r0, 0x203) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) dup2(r0, r2) 12:06:46 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x100, 0x118, 0x9, {"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"}}, {0x0, "a9d2d524db47c720e0f70d04661eedb7c6431fb4f6f2f2fe7a1bdecdf35a251348915ca8274e22df972f1b744a8b1c6042f507934cdb5d6a30e1063903f3447cb9fc181e710a0a4e310f4c17b74a7c248d64294896a148e4728b37ffe259cb561f1365bd73e88551b27d7bfffc8b48b2f195b2e233888d482abae9accc8d93045d9636ec6002ea70ba36dbfd73d9b1149e8afd696b237276b96049f57e4d36700995cda4cd576ce8288d4260263fdbc51a5ca2e0fb15a40723bd"}}, &(0x7f0000000200)=""/122, 0x1d4, 0x7a, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffff9c, 0x10, &(0x7f0000000380)={&(0x7f0000000a40)=""/4096, 0x1000, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r1, 0x10, &(0x7f0000000400)={&(0x7f00000002c0)=""/148, 0x94, r2}}, 0x10) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) bpf$MAP_CREATE(0x0, &(0x7f0000000540)={0x10, 0x7, 0xfffffffffffffff8, 0x4, 0x20, 0x1, 0x401}, 0x2c) r3 = fcntl$getown(r0, 0x9) ptrace$setopts(0x80000004200, r3, 0x6, 0x10) r4 = socket$can_raw(0x1d, 0x3, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0x14) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000640)='/dev/cachefiles\x00', 0x100, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r6, 0xc0605345, &(0x7f0000000580)={0x7f, 0x1, {0x3, 0x3, 0x6, 0x0, 0x1ff}}) bind$can_raw(r4, &(0x7f0000000500)={0x1d, r5}, 0x10) [ 792.794476] hfs: unable to parse mount options [ 792.800048] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. 12:06:46 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x40000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:46 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000080)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000180)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=@delqdisc={0x2c, 0x25, 0x400, 0x70bd2b, 0x25dfdbfb, {0x0, r1, {0x6, 0xffff}, {0xfffb, 0xd}, {0xffff, 0x3}}, [@TCA_EGRESS_BLOCK={0x8, 0xe, 0xfffffffffffffff8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40040}, 0x4000000) socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:46 executing program 2: sched_setaffinity(0x0, 0xfffffc88, 0x0) io_setup(0x8000, &(0x7f0000000080)) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 792.955148] hfs: unable to load codepage "none" [ 792.963768] hfs: unable to parse mount options 12:06:47 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x48000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:47 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x500000000000000}) 12:06:47 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f00000001c0)=@v3={0x3000000, [{0x9, 0x7fff}, {0x7, 0x20}], r0}, 0x18, 0x0) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3, 0x80000) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000040)) [ 793.194567] netlink: 'syz-executor4': attribute type 18 has an invalid length. [ 793.233168] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. [ 793.235014] hfs: unable to load codepage "none" [ 793.283269] hfs: unable to parse mount options [ 793.363290] hfs: unable to load codepage "none" [ 793.370817] hfs: unable to parse mount options 12:06:47 executing program 4: sched_setaffinity(0x0, 0xfffffffffffffef1, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) shutdown(r1, 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)) syslog(0xf, &(0x7f0000000000)=""/193, 0xde) 12:06:47 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:47 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:47 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000)="9ea8ae7b2e8750c1fb6dee19b79f4d448bdb90487dcdee9f5076d8f0af57facb1fb15008ed7ab86ad8fb5e21819c92c9b9e7945f2b589e8eee00bf8f1b8565b343ce96f42aabaae3", 0x48) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0xb, &(0x7f0000000940)=""/193, 0xc1) r1 = dup(r0) ioctl$VIDIOC_S_EDID(r1, 0xc0285629, &(0x7f0000000300)={0x0, 0x9, 0x9, [], &(0x7f00000002c0)=0x40}) r2 = syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x2, 0x212002) ioctl$SCSI_IOCTL_SYNC(r2, 0x4) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2cc000, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000100)={{{@in=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000000200)=0xe8) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000240)={0x3, 0x6, r4, 0x0, r5, 0x0, 0x9, 0x4}) 12:06:47 executing program 3: getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x400001ff}, &(0x7f000000affc)=0x20) sigaltstack(&(0x7f0000001000/0x1000)=nil, &(0x7f0000000ff8)) r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x0, 0x2) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) sigaltstack(&(0x7f0000001000/0x1000)=nil, &(0x7f0000000000)) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x802, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, &(0x7f0000000040)) 12:06:47 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x600000000000000}) 12:06:47 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x60000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:47 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:06:47 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000040)={0x1, 'lo\x00', 0x2}, 0x18) r2 = syz_open_procfs(0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000000)={0x9, 0x9, 0x4}) dup2(r0, r3) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) 12:06:47 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x85e257346eb0ec78, 0x86) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000100)=0xf4240) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x34ae, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000080)={0xd1, 0x2, 0x4, 0x2}) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) r2 = semget(0x2, 0x4, 0x0) semctl$GETZCNT(r2, 0x3, 0xf, &(0x7f0000000000)=""/38) 12:06:47 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x200800, 0x0) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000040)={0x3, 0x7fff}) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:47 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x68000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:47 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000280), 0x1}, 0x20) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x4, 0x10000}) 12:06:47 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:47 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000100)={'syz'}, 0x0, 0xfffffffffffffffe) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1) r1 = socket$inet6(0xa, 0x3, 0x5) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/null\x00', 0x80040, 0x0) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000001340)='nbd\x00') r4 = openat$full(0xffffffffffffff9c, &(0x7f0000001380)='/dev/full\x00', 0x200, 0x0) r5 = dup2(r0, r1) sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f0000001480)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x2204}, 0xc, &(0x7f0000001440)={&(0x7f00000013c0)={0x7c, r3, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xc9}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x7fff}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x5}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_SOCKETS={0x14, 0x7, [{0x8, 0x1, r4}, {0x8, 0x1, r5}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x200}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40}, 0x80) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f00000000c0)={0x8, 0x1, 0x7, 0x100000001, 0x7}, 0xc) stat(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r6, r7) [ 793.943987] hfs: unable to load codepage "none" [ 793.954821] hfs: unable to parse mount options 12:06:47 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) getresuid(&(0x7f0000000000)=0x0, &(0x7f0000000040), &(0x7f0000000080)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000001c0)=0xe8) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r1, r2, r3) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:48 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0xffffffffffffffff) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 794.083895] hfs: unable to load codepage "none" [ 794.088615] hfs: unable to parse mount options 12:06:48 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x700000000000000}) 12:06:48 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x95d6, 0x20000) getsockname$netlink(r0, &(0x7f0000000100), &(0x7f0000000140)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffff9c, 0xc008640a, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r1, 0x40086409, &(0x7f0000000080)={r2}) syslog(0x9, &(0x7f00000001c0)=""/193, 0x674d12694a9e431e) 12:06:48 executing program 4: setrlimit(0x8000000000006, &(0x7f00000a3ff0)) r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000001380)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f0000000080)=[@release], 0x17f, 0x0, &(0x7f0000000300)}) setuid(r1) setreuid(r1, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300), &(0x7f00000004c0)) 12:06:48 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x74000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 794.155053] sg_read: process 3378 (syz-executor3) changed security contexts after opening file descriptor, this is not allowed. [ 794.273190] binder: 4283:4286 Release 1 refcount change on invalid ref 0 ret -22 12:06:48 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f00000002c0)=""/193, 0xc1) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x40) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000100)={0x9, [0x95, 0x80, 0xd20a, 0xfffffffffffffff8, 0xa8d, 0x0, 0xffffffff, 0x6, 0x4]}) r1 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x4, 0xa003c) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000080)={0x36, &(0x7f0000000040)=""/54}) 12:06:48 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='veth1_to_bond\x00') setsockopt(r0, 0x65, 0x10000000006, &(0x7f0000000200)="c8d63f23", 0x4) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x9, 0x4100) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r1, 0xc0105303, &(0x7f00000000c0)={0x5, 0xff}) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000080)=0x1, 0x4) 12:06:48 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 794.330277] binder: 4283:4286 unknown command 0 [ 794.393694] binder: 4283:4286 ioctl c0306201 20000040 returned -22 12:06:48 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000080)={0x8, 0x8200, 0xc3, 0x2, r1}, &(0x7f00000000c0)=0x10) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 794.439147] binder_alloc: binder_alloc_mmap_handler: 4283 20001000-20004000 already mapped failed -16 [ 794.468382] hfs: unable to load codepage "none" [ 794.473298] hfs: unable to parse mount options 12:06:48 executing program 2: r0 = getpgrp(0x0) sched_setaffinity(r0, 0x1684d286814ed3c3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x40, 0x0) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000100)={0x400, 0x2, 0xffffffffffffffa8}) openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000000)=0xfffffffffffffffb, 0x8) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af12, &(0x7f0000000040)={0x0, 0xffff}) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:48 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) ioctl$KDADDIO(r0, 0x400455c8, 0x9) [ 794.496474] binder: BINDER_SET_CONTEXT_MGR already set [ 794.504951] binder: 4283:4308 ioctl 40046207 0 returned -16 [ 794.527202] binder: 4283:4316 Release 1 refcount change on invalid ref 0 ret -22 [ 794.551229] binder: 4283:4316 unknown command 0 [ 794.560575] binder: 4283:4316 ioctl c0306201 20000040 returned -22 12:06:48 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:48 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800, 0x800) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000), 0x8) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3, 0x400) ioctl$RTC_VL_CLR(r1, 0x7014) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 794.592619] hfs: unable to load codepage "none" [ 794.597982] hfs: unable to parse mount options 12:06:48 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0xa00000000000000}) 12:06:48 executing program 4: setrlimit(0x8000000000006, &(0x7f00000a3ff0)) r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000001380)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f0000000080)=[@release], 0x17f, 0x0, &(0x7f0000000300)}) setuid(r1) setreuid(r1, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300), &(0x7f00000004c0)) 12:06:48 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) ioprio_get$uid(0x3, r1) sched_setaffinity(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x4000, 0x0) connect$can_bcm(r3, &(0x7f0000000240)={0x1d, r0}, 0x10) chown(&(0x7f0000000140)='./file0\x00', r1, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 794.768818] binder: 4335:4336 Release 1 refcount change on invalid ref 0 ret -22 [ 794.778119] binder: 4335:4336 unknown command 0 [ 794.802739] binder: 4335:4336 ioctl c0306201 20000040 returned -22 12:06:48 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x4000002) mount(0x0, 0x0, 0x0, 0x100000, &(0x7f0000000040)='em0posix_acl_access}-selinuxnodev\\\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x800, 0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f0000000080)={@dev, @multicast2, 0x0}, &(0x7f00000000c0)=0xc) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000100)={r1, 0x5, 0x3, 0x0, 0x9, 0x7, 0x5}) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:48 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x97ffffff, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 794.832344] Bluetooth: hci1: Frame reassembly failed (-84) 12:06:48 executing program 4: r0 = open(&(0x7f0000000200)='./file0\x00', 0x14104a, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="4443ccfb3bc015193cf2033319ffa030adbc1c2bfa5a578143ada744767fb6eb5ed50d813486bc38222c3f47069449a672bbabbdbae35861e46d2d34d654a84b7f7b2b1ca4a64636a4dcd89b4ab56cb01069f235d73bd4fef32a91e56f362472f7dc8051bbb7145cc0f9820e13849d01f08c869fea8720bd0daf8f1e1f0cda06151767681543f94931bc3bc70d7a23c7978497ed89810fa3681fdfa121df7be9479be9f5af794ee21b1810b8d8d356b79bc198c4789098c5faa42f586f165a92c5b60580b1393ec9420c2c29bb7f437d27c8e706bd555a1c30ee32506227af6beac5c4", 0xe3) write$P9_RGETATTR(r0, &(0x7f0000000240)={0xa0}, 0xa0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x1, 0x101005) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) sendfile(r2, r1, 0x0, 0xfff) [ 794.885388] hfs: unable to load codepage "none" [ 794.890311] hfs: unable to parse mount options 12:06:48 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x18840, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x103500, 0x0) connect$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x100, {0x100000001, 0x0, 0x4, 0x5, 0xf99a, 0x101}, 0x3, 0x9}, 0xe) 12:06:49 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 795.007311] hfs: unable to load codepage "none" [ 795.012179] hfs: unable to parse mount options 12:06:49 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0xc0ed0000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 795.105994] audit: type=1804 audit(1547813209.060:74): pid=4370 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir613724407/syzkaller.bEMi9M/1019/file0" dev="sda1" ino=17456 res=1 [ 795.131697] audit: type=1804 audit(1547813209.090:75): pid=4365 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir613724407/syzkaller.bEMi9M/1019/file0" dev="sda1" ino=17456 res=1 [ 795.170740] audit: type=1804 audit(1547813209.120:76): pid=4365 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir613724407/syzkaller.bEMi9M/1019/file0" dev="sda1" ino=17456 res=1 [ 796.823009] Bluetooth: hci0: Entering manufacturer mode failed (-110) [ 796.823017] Bluetooth: hci1: Entering manufacturer mode failed (-110) 12:06:50 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r1 = fcntl$dupfd(r0, 0x406, r0) write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="2f696f202f706964732000637075202f696f205c2404dddb60cf3d3557435314265dfe81033dcf37be1642ceeb452add928b37aad6a02690885aa732b00254e9bea803fbf01eb9f9ff628f1652aae0903e25f41219b5818c687f6858ba9291123b75fcd3cdb7bf5bff6d6816156406411810b90b229353ebac8bdd16130e4a784fd6783e9a5dcffc6f5ed7f1581c046a09a582b5ed0aa119c26872"], 0x13) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:50 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x2000000000000000}) 12:06:50 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:50 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1, 0x4}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x1ff, &(0x7f0000000000)) listen(r0, 0x7) stat(0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000040), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) close(r2) 12:06:50 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:50 executing program 4: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e24, 0x49290363, @local, 0xffffffff}}}, &(0x7f0000000140)=0x84) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000200)={[], 0x7, 0x9, 0x7, 0x9, 0xd4db835, r0}) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000180)={r2, 0x1e287489}, &(0x7f00000001c0)=0xc) tkill(r0, 0x1) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xa8}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 12:06:51 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0xfcfdffff, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 797.071862] hfs: unable to load codepage "none" [ 797.079312] hfs: unable to parse mount options 12:06:51 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000180)='&[\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x1, &(0x7f0000000000)=""/193, 0xc1) 12:06:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 12:06:51 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:51 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = semget(0x3, 0x2, 0x2) semctl$GETVAL(r0, 0x4, 0xc, &(0x7f0000000000)=""/153) openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x200000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000140)={0x1, 0x800}) getsockopt$inet_opts(r1, 0x0, 0xd, &(0x7f0000000a40)=""/4096, &(0x7f0000000180)=0x1000) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 797.204134] hfs: unable to load codepage "none" [ 797.208973] hfs: unable to parse mount options 12:06:51 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0xfdfdffff, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:51 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x20000000, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000040)=0x8, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xe}]}, 0x18}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000140)={0x4, 0x8, 0xfa00, {r2, 0x10001}}, 0x10) 12:06:51 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x2010000000000000}) 12:06:51 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1, 0x4}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x1ff, &(0x7f0000000000)) listen(r0, 0x7) stat(0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000040), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) close(r2) 12:06:51 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000180), 0x80000) ioctl$SIOCAX25NOUID(r0, 0x89e3, &(0x7f00000001c0)=0x1) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000040)=0x7, 0x4) 12:06:51 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x100000000000024f, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:51 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0xfdffffff, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 797.488867] hfs: unable to load codepage "none" [ 797.508186] hfs: unable to parse mount options 12:06:51 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0xfffffdfc, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 797.662914] hfs: unable to load codepage "none" 12:06:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x81}, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x1}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000181000/0x4000)=nil, 0x4000, 0x1000001) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xa) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='/exe\x00\x00\x00\x00\x00\x00') add_key(0x0, 0x0, &(0x7f0000000200), 0x0, 0xfffffffffffffffc) keyctl$get_security(0x11, 0x0, 0x0, 0x0) io_setup(0x1, &(0x7f0000000700)=0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x4000, 0x0, 0x7, 0x0, 0x0, r0, &(0x7f0000000200), 0xfffffdcc}]) [ 797.704226] hfs: unable to parse mount options 12:06:51 executing program 2: r0 = gettid() sched_setaffinity(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa888, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:51 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) getpeername$unix(r0, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:51 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0xfffffdfd, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:51 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x3f00000000000000}) 12:06:52 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0xffffff7f, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:52 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f0000000040)={0x21, 0x3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xfffffffffffffff6) [ 798.061136] hfs: unable to load codepage "none" [ 798.069686] hfs: unable to parse mount options 12:06:52 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1, 0x4}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x1ff, &(0x7f0000000000)) listen(r0, 0x7) stat(0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000040), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) close(r2) 12:06:52 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) r1 = dup(r0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0x4004af07, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f0000000080)={0x4, 0x3, 0xbc66, 0xffff, 'syz1\x00', 0xfffffffffffffffe}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000000c0)={0x8, [0x5, 0x5, 0x2, 0xf07, 0x8, 0x100, 0x9, 0xc3a5]}, &(0x7f0000000100)=0x14) 12:06:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, &(0x7f0000000000)=0x4, 0x9, 0x1) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:52 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 798.219649] hfs: unable to load codepage "none" [ 798.241549] hfs: unable to parse mount options 12:06:52 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:52 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x4000000000000000}) 12:06:52 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0xffffff97, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:52 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x80000000, 0x200002) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x40, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000200)=0x3fd, 0x2) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000640), &(0x7f0000000540)=0x0, &(0x7f0000000580)) ioctl$TUNSETGROUP(r3, 0x400454ce, r5) openat$tun(0xffffffffffffff9c, &(0x7f0000000600)='/dev/net/tun\x00', 0x0, 0x0) r6 = userfaultfd(0x0) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r2, &(0x7f0000000280)={0x2}) ioctl$UFFDIO_API(r6, 0xc018aa3f, &(0x7f0000000080)) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f00000002c0)={{0x7, 0x2}, 0x1}, 0x10) r7 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000011000/0x2000)=nil, 0x2000, 0x0, 0x11, r7, 0x0) write$P9_RLOPEN(r7, &(0x7f0000000000)={0x18}, 0x18) ioctl$UFFDIO_REGISTER(r6, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r6, 0xc020aa04, &(0x7f0000000040)={{&(0x7f0000011000/0x1000)=nil, 0x1000}}) recvfrom$inet6(r3, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) connect$l2tp(r1, &(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e21, @multicast2}, 0x1, 0x0, 0x1, 0x1}}, 0x2e) userfaultfd(0x80000) openat$rfkill(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/rfkill\x00', 0x43fff, 0x0) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r4, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8004700b, &(0x7f0000000040)) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x4e21, 0xfffffffffffffff9, @loopback, 0x20}, {0xa, 0x4e21, 0x0, @mcast1, 0x200}, 0x100000000, [0x9, 0x9, 0x80, 0x4, 0x80, 0x100000001, 0x6, 0x1]}, 0x5c) get_thread_area(&(0x7f00000004c0)={0x3, 0xffffffffffffffff, 0xffffffffffffffff, 0x6acbcdb8, 0xd1c, 0x79fe, 0x6, 0x80000000, 0x2, 0x1a}) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e24, 0x101, @local, 0x281}, {0xa, 0x4e23, 0x82d, @mcast1, 0x7}, 0x7, [0x1, 0x7d, 0xbc6, 0x4, 0x9, 0x1, 0x4, 0xffffffffffffffff]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0xa800000000000000, 0x2, 0x7]}, 0x5c) 12:06:52 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x100, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000100)={'veth0_to_bond\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x20}}}) accept$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x1c) r1 = socket$caif_stream(0x25, 0x1, 0x2) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000000)={'vcan0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) 12:06:52 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:52 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) socketpair(0x9, 0x0, 0x5, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000040)=0x3, 0x4) [ 798.634969] hfs: unable to load codepage "none" [ 798.639793] hfs: unable to parse mount options [ 798.805458] hfs: unable to load codepage "none" 12:06:52 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0xfffffffd, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 798.826586] hfs: unable to parse mount options 12:06:52 executing program 3: mbind(&(0x7f0000ecb000/0x1000)=nil, 0xfffffffffffffdb2, 0x0, &(0x7f0000885ff8), 0x5, 0x0) syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x6, 0x40) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3ff, 0x40000) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000040)={0x5, 0x0, [{}, {}, {}, {}, {}]}) 12:06:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, &(0x7f0000000000)=0x4, 0x9, 0x1) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:52 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0x8cffffff00000000}) 12:06:52 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) pread64(r0, &(0x7f0000000080)=""/53, 0x35, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000000)=0xffffffffffffffff, 0x4) 12:06:52 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) r0 = getpgid(0x0) process_vm_readv(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=""/175, 0xaf}, {&(0x7f00000000c0)=""/206, 0xce}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/220, 0xdc}, {&(0x7f00000002c0)=""/63, 0x3f}, {&(0x7f0000000300)=""/251, 0xfb}], 0x6, &(0x7f0000000800)=[{&(0x7f00000004c0)=""/249, 0xf9}, {&(0x7f00000005c0)=""/63, 0x3f}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/21, 0x15}, {&(0x7f00000006c0)=""/183, 0xb7}, {&(0x7f0000000780)=""/106, 0x6a}], 0x6, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) socket$nl_xfrm(0x10, 0x3, 0x6) 12:06:53 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x1000000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 799.064808] hfs: unable to load codepage "none" [ 799.073819] hfs: unable to parse mount options 12:06:53 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) socketpair(0x9, 0x0, 0x5, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000040)=0x3, 0x4) 12:06:53 executing program 4: perf_event_open(&(0x7f0000001400)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000200)=@v1={0x2, "56d3407688796a354c14"}, 0xb, 0x2) r0 = socket$kcm(0x10, 0x4000000002, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000000)={'stack ', '&:\n\v\xd0a\x1bp\xcb\x06\x9aQnN\x1e\xd5\xaa\n\xfa\x14]S\xf7l5,ne\xc3\x19\xc5\x13\x88\x8e\x96\b\x8c\xdeTd.3\xfb\x89#\x8dU\xee\b\x86B\x15\xa8\v\xa0o!%\xebk\x17c\x8eP\x97e*\xcb!\xae\t\x85\xc8\xe5Z\xe6g\xd5\xf5.\x1f\xd1\x94~\xcb\xe1'}, 0x5c) r2 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x1, 0x0, &(0x7f0000000480)="f2"}) write$P9_RFLUSH(r2, &(0x7f0000000240)={0x7, 0x6d, 0x1}, 0x7) dup2(r2, r3) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e0000002600812de45ae087185082cf0224b0eba06ec400002300000900080000000000000872183b0000000000", 0x2e}], 0x1}, 0x0) [ 799.220034] hfs: unable to load codepage "none" [ 799.228272] hfs: unable to parse mount options 12:06:53 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x0, &(0x7f0000000100)=""/193, 0xc1) 12:06:53 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) r0 = getpid() perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, r0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000100)=""/193, 0xc1) 12:06:53 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0xedc000000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 799.289958] audit: type=1400 audit(1547813213.242:77): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=263A0A0BD0611B70CB069A516E4E1ED5AA0AFA145D53F76C352C6E65C319C513888E96088CDE54642E33FB89238D55EE08864215A80BA06F2125EB6B17638E5097652ACB21AE0985C8E55AE667D5F52E1FD1947ECBE1 pid=4573 comm="syz-executor4" [ 799.382595] netlink: 26 bytes leftover after parsing attributes in process `syz-executor4'. 12:06:53 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0xf6ffffff00000000}) 12:06:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x11, 0x2, r1, 0x0) read(r2, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) dup2(r3, r2) write$P9_RLERROR(r3, &(0x7f0000000000)=ANY=[@ANYBLOB='f'], 0x1) syz_mount_image$nfs4(&(0x7f0000000040)='nfs4\x00', &(0x7f00000000c0)='./file0\x00', 0x9, 0x5, &(0x7f0000001380)=[{&(0x7f0000000100), 0x0, 0xff}, {&(0x7f0000000140)="722c14473d745553b7503a0278aae380d53c34e03f9034e1276fcb96e08a1d78bf0fa31ed8a6e8dca0159949980b262fe2f15ebc4c88a05028455e9f6165b5148f5a963b0a", 0x45, 0x80}, {&(0x7f0000000280)="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", 0x1000, 0x1c09}, {&(0x7f00000001c0)="062f624c0e4a79cdfbbab5d806ba27660bc03f5481e7e81e380c802cf32969", 0x1f}, {&(0x7f0000001280)="dcebb955e69c135b92a9dcc25280cea1ac27340a20b4ff643ef46f7fe673f4baa13db14469f9d47c1d1403cfe810f4541c633ca2b2e163f508123e8942021ef92f005e0e1395f79cd666db88004b9569d32b1703ba745e036c1767bad5305c9e5ba0d20b60d2960768aa3c54de5ece70268ba65b8b380fc5759cb81f40dddc4c3472d2cbda97ca897efe63a2de8cec38d14623e4e578572d369e436ee8b64edfda279de7f7d88fa725be8a26d355eb5f81e005348236eef7fda77a89d6708217e92aa8510f6c0d799a74", 0xca, 0x1}], 0x0, &(0x7f0000000200)='-\xe0wlan1GPL\x00') 12:06:53 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, &(0x7f00000000c0)={0x1, 0x0, 0x101, 0x2, {0x3, 0xffffffff, 0x4, 0x5}}) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x5, 0x2) ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f0000000040)={0x3, 0x2}) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:53 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2002, &(0x7f0000000940)=""/193, 0xc1) 12:06:53 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x4000000000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:53 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000180)='+', 0x1}], 0x1, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f0000000040)) getpid() write$cgroup_int(r1, &(0x7f0000000440), 0x12) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000280)="7c9da1b91a2320b118f9a9c098e00bb1", 0x10) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x80800) splice(r0, 0x0, r4, 0x0, 0x20000000003, 0x0) sendto$rose(r1, &(0x7f00000001c0)="38901f7627a9bccd4d2d5c9be1947cd1fb5a82ac76637d2b54f378964ad0578c817187ba209bbd092d32f5869090f0538fcdb0266df21948da3ae54c0b95ddfeb48f12ed35cef7b6ab043fe185419ac1fde468a92446e7a98ab9f417ffa4", 0x5e, 0x4000, &(0x7f0000000240)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nfc_llcp(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000002c0)="1c8d9de92d4d6219ed174a6738", 0xd}], 0x1}, 0x8004) recvmmsg(r4, &(0x7f0000004940)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 799.612922] hfs: unable to load codepage "none" [ 799.621328] hfs: unable to parse mount options 12:06:53 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 799.769939] hfs: unable to load codepage "none" 12:06:53 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x20201, 0x0) fcntl$setflags(r0, 0x2, 0x1) sched_setaffinity(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x68, &(0x7f0000000100)=[@in={0x2, 0x4e20, @broadcast}, @in6={0xa, 0x4e20, 0x80000001, @local, 0x7}, @in6={0xa, 0x4e21, 0x7fffffff, @mcast1, 0x8}, @in={0x2, 0x4e20, @multicast2}, @in={0x2, 0x4e22, @multicast2}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000001c0)={r1, 0x1, 0x10001, 0x3}, &(0x7f0000000200)=0x10) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000080)={0x1, 0x77775f5f, 0x3, 0x2aa0, 0x3, @stepwise={{0x4ef, 0x1}, {0x1}, {0x7ff, 0x1}}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000240)={0xdbbc, 0x80000001}) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 799.792894] hfs: unable to parse mount options 12:06:53 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x401, 0x0) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000100)={0x1, 0xb, 0x4, 0x100400, {0x77359400}, {0x3, 0x0, 0x8, 0x8, 0x1, 0x7, "5b81fb6f"}, 0x7f, 0x6, @userptr=0xfffffffffffffff7, 0x4}) r2 = dup(r0) r3 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) syncfs(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f00007b1000)=0x81, 0x4) sysfs$3(0x3) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000001340)={0x0, 0x7f}, &(0x7f0000001380)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000013c0)={r4, 0x6}, 0x8) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x20) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000001440)={0x0, @in6={{0xa, 0x4e23, 0xd18, @dev={0xfe, 0x80, [], 0xa}, 0x3ff}}}, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = fcntl$dupfd(r5, 0x0, r5) bind$bt_rfcomm(r6, &(0x7f0000000440)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x3}}, 0xa) ioctl$KDSKBLED(r2, 0x4b65, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f00000002c0)={0xffff0000, 0x18, 0x1708, {0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1a000]}}, 0x20) 12:06:53 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={r0}) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000040), 0x2) r3 = dup2(r2, r1) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000080)={0x0, 0x101}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000100)={r4, @in6={{0xa, 0x4e21, 0x4, @local, 0x5}}, 0x4, 0x7f}, 0x90) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:53 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0xffffff7f00000000}) 12:06:54 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 800.108739] hfs: unable to load codepage "none" [ 800.114836] hfs: unable to parse mount options 12:06:54 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x38) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x0, r0}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x7, 0x7, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000180)='GPL\x00', 0x80000001, 0x1000, &(0x7f0000000400)=""/4096}, 0x48) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) r3 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_keyring_id(0x0, r3, 0x81) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000300)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000001400)={0x8, 0x120, 0xfa00, {0x0, {0x4c2, 0x0, "234b240feb79415c98a2602e6de73c3955cc2f85a022225c59e2770fe1df10614593d394dc5c2031a79c13b86e844c32aca5fbc96a1640d46e765d79d53f077a2fdf7aa13536f66ed7e373b05b25cbe6a5557ef679aa4c14e579c4a6ccba9dd9ade0b0e0d34556cfcb4a6256d5af13fec8699326822595639ed5755d6e413ac51f0ef0debb0a5a0fcc4802a445edd48b5bc58f818ffc7c414a22fa3f0a2b1363a09e883ba710b339253b48d0de07e5ab01edd41f06ea4d2a106deb8a22c2faeef5eb3f963c3afe27f1a40bbf8a2650240fcab90315870a5c00a2cfa40b8a9be382f2576bdaf3a9e0512a6b910e43ee8cae47db2407ce8906c6cb01d8e7019c9f", 0xfe, 0xffff, 0x2, 0xaa, 0x6, 0x2947e184, 0x400}, r4}}, 0x128) ioctl$CAPI_GET_FLAGS(r2, 0x80044323, &(0x7f0000000240)) ioctl$VIDIOC_S_TUNER(r2, 0x4054561e, &(0x7f0000000100)={0x0, "d0e12c69ca5858496a7251b42abad47a7f68a82e6952f991076392883ccb5f81", 0x5, 0x1204, 0x1b0, 0xceb, 0x6, 0x4, 0x3f, 0x3}) 12:06:54 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:54 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x66, 0x4000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000040)={0x10001, 0x4, 0xffffffff, 'queue0\x00'}) syslog(0x2, 0xfffffffffffffffd, 0xfeb4) [ 800.245776] hfs: unable to load codepage "none" [ 800.251713] hfs: unable to parse mount options 12:06:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000380)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) syncfs(r1) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000004400)=0x101, 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 12:06:54 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0xa01, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0xff, 0x0, 0x1, 0x3ff}, &(0x7f0000000100)=0x18) set_robust_list(&(0x7f00000001c0)={&(0x7f0000000040), 0x100, &(0x7f0000000180)={&(0x7f0000000080)}}, 0x18) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000140)={r1, 0x3}, 0x8) socket$inet6_udp(0xa, 0x2, 0x0) 12:06:54 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x1c, 0x10001d, 0x405, 0x0, 0x0, {0x5}, [@nested={0x8, 0x5, [@generic='!']}]}, 0x1c}}, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0xd64}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000000c0)={r3, 0x4}, 0x8) 12:06:54 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0xffffffff00000000}) 12:06:54 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = open(&(0x7f0000000080)='./file0\x00', 0x20000, 0x10) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f00000000c0)) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xffffffff, 0x10180) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f0000000040)=0x5) [ 800.425841] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 12:06:54 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:54 executing program 2: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000300)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@dev, @in6=@empty}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000440)=0xe8) setresuid(r3, r2, r2) sched_getscheduler(r1) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x48200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000000000000, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) ioctl$TIOCEXCL(r0, 0x540c) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000480), &(0x7f00000004c0)=0xc) syslog(0xc, &(0x7f0000000080)=""/193, 0xfffffffffffffeb9) 12:06:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x1c, 0x10001d, 0x405, 0x0, 0x0, {0x5}, [@nested={0x8, 0x5, [@generic='!']}]}, 0x1c}}, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0xd64}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000000c0)={r3, 0x4}, 0x8) 12:06:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x707, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0xc, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0xf, 0x7}]]}}}]}, 0x3c}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000600)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r1, &(0x7f0000000040)={0x80000000}) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000640)=0x9, 0x4) [ 800.617861] hfs: unable to load codepage "none" [ 800.647984] hfs: unable to parse mount options 12:06:54 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:54 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) process_vm_readv(r1, &(0x7f0000000040)=[{0x0}], 0x10eb, 0x0, 0xfffffffffffffeb9, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) r2 = dup2(r0, r0) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000080)=""/145) [ 800.718330] netlink: 'syz-executor4': attribute type 15 has an invalid length. [ 800.739935] netlink: 'syz-executor4': attribute type 15 has an invalid length. 12:06:54 executing program 3: setrlimit(0x8, &(0x7f00000a3ff0)) r0 = socket(0x40000000015, 0x5, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000180)=0xe8) r4 = dup2(r0, r0) ioctl$KVM_RUN(r4, 0xae80, 0x0) setresuid(r1, r2, r3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r5) r6 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r6, 0xb) r7 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xfffffffffffffffa, 0x2) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000003c0)={0x0, r7, 0x5, 0x2}, 0x14) [ 800.786372] hfs: unable to load codepage "none" [ 800.799624] hfs: unable to parse mount options 12:06:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x10000) getsockopt$sock_buf(r0, 0x1, 0x1f, &(0x7f0000000040)=""/32, &(0x7f0000000080)=0x20) 12:06:54 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x2) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1, 0x400200) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) 12:06:54 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:54 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}], [], 0xffffffffffffffff}) 12:06:54 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x250200, 0x0) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f00000002c0)=""/4096) r1 = creat(0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000001340)={0x7, 0x14, [0x7, 0x800, 0x9, 0x5, 0x5]}) r2 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$TCGETS(r2, 0x5401, &(0x7f00000000c0)) ioctl$BLKPG(r2, 0x1269, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f00000012c0)) getsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000000140), &(0x7f00000001c0)=0x6) listen(r0, 0x4) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, 0x0) r3 = open(&(0x7f0000000280)='./file0\x00', 0x20141042, 0xfffffffffffffffc) epoll_pwait(r0, &(0x7f0000000100)=[{}, {}, {}, {}], 0x4, 0x2, &(0x7f0000001300)={0x9}, 0x8) ftruncate(r3, 0x80080) sendfile(r2, r3, 0x0, 0x2008000fffffffe) 12:06:55 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x4, &(0x7f0000000100)=""/193, 0xc1) 12:06:55 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:55 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x16400, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x7, 0x9, 0xfff, 0xfffffffffffff801, @tick=0xfffffffffffffffe, {0x1, 0x400}, {0x7ff, 0x7}, @quote={{0x3, 0x1f}, 0x6, &(0x7f0000000040)={0x50, 0xa000000000000000, 0x8, 0x100000000, @tick=0x7, {0xf5, 0x3}, {0x5, 0x8}, @raw32={[0x101, 0xffffffff, 0x3]}}}}], 0x30) getsockopt$inet6_buf(r0, 0x29, 0x2c, &(0x7f00000000c0), &(0x7f0000000100)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@remote, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000340)=0xe8) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000380)={@empty, @mcast2, @dev={0xfe, 0x80, [], 0x15}, 0x8, 0x3, 0x2, 0x500, 0x2, 0x400003, r1}) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000400)={0x200, 0xbe1, @name="6125ec4d30887cb3d70946987f1d3a384c0b9ea14ffe66e8da5817d3771fdee9"}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000480)='/dev/video1\x00', 0x2, 0x0) r4 = gettid() ptrace$peekuser(0x3, r4, 0x7) getsockopt$sock_buf(r2, 0x1, 0x3d, &(0x7f00000004c0)=""/17, &(0x7f0000000500)=0x11) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000540)=0x1, 0x4) ioctl$TIOCSCTTY(r0, 0x540e, 0x3) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r3, 0xc0845657, &(0x7f0000000580)={0x0, @reserved}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000680)={0x5, 0x70, 0xb51, 0x6f83, 0x1, 0x6, 0x0, 0x82, 0x0, 0x1, 0x40, 0xff, 0x2, 0x3, 0x8000, 0x81, 0x1800000000000000, 0x10000, 0x9, 0xffff, 0x5, 0x6, 0x2, 0x2, 0x0, 0x7ff00, 0x1, 0x7ff, 0xd9, 0xff, 0x1, 0x8, 0x2, 0x4, 0xffff, 0xff, 0x0, 0x9, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000640), 0x1}, 0x1000, 0x3, 0x35c000, 0x8, 0xfffffffffffffffa, 0x5, 0x100000000}) sendmsg(r0, &(0x7f0000000ac0)={&(0x7f0000000700)=@l2={0x1f, 0x2, {0x3d, 0x58, 0x1, 0x100000001, 0x401, 0x1}, 0xfff}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000780)="1482347113075a1eacf8801be50ce78f3a104a77e12a5bf82e89ca42b4aab0ebfbf286eaf5bad5788ac688a143676c8d11a5341b1562152d9f29d4a0cb3a1a9dcb3916b02a105d434c5b85d38f6e52ae43ac0318ca300c08939d389e79d672752198ef48b225d58f877640c412f151171fef829eef21c627cc0054f5ac6ffa8cd7ce307ded0a579845ac6b5a68518392e65f7db2a59021c52e167e397c", 0x9d}], 0x1, &(0x7f0000000880)=[{0x30, 0x1, 0x0, "145c0a898a526cde190ac2dfcf366a0f3be89787d2aae93529a71ec078df72"}, {0x10, 0x0, 0x81}, {0x48, 0x10e, 0x6, "ed5863a3aeb6a68f46c4b5288722bbce5e966ad1f5939e5d5e74795823da97b1e9a5fa6deed804b3d42c3b7ea75a5f5b4909"}, {0x98, 0x104, 0x6, "5a21346912366263330b4086154b21c7afa035c388c2efb0802ab577a76a07a5bb3ae997f7bc5f736f4bb854df0a17fb3f784274e75ae2a91b03441e257bcdee05cc0acd68a197297cbfd7a11fedca7dc9076f60b7b80c64eb706a7a73c87c3f007706534731213dcde2e5c3496f3bc6ca319b60a9c8d7d94e38add8b10855436e"}, {0x90, 0x113, 0x9, "383353db21f8cc0a221f4b6cdbf59ca8e8f7cde6c685485b7e7d789d884acb6e9d7ea78e70493d6ea797d6a0487746c0af4da9d40ad135bc21297edb7a96ba18330349f76f170968d1425f5207a39bd0a300fdcfd6c8c9982bd565eb8de726254c64ff3ef79c4cdff6cc362dae324baf2431217329532d363c6b0e9da044fa"}, {0x58, 0x1bf, 0xfffffffffffffff8, "617ca961a6b61dd75221bb3108d708b9eb18a444d88e92cce61f2f6c05693697023a37595413ab9ec8997a08a4197fbe9e38b5322cd5eb9afe4d26b3748826648d094e834a48"}], 0x208}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000b00)={@mcast1, 0x29, r1}) accept4$inet(r0, &(0x7f0000000b40), &(0x7f0000000b80)=0x10, 0x80000) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f0000000bc0)={0x4, 0x1000}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000c00)={0x0, 0x2911}, &(0x7f0000000c40)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000c80)=r5, 0x4) sendmsg$rds(r2, &(0x7f0000001100)={&(0x7f0000000cc0)={0x2, 0x4e21, @local}, 0x10, &(0x7f0000001080)=[{&(0x7f0000000d00)=""/196, 0xc4}, {&(0x7f0000000e00)=""/38, 0x26}, {&(0x7f0000000e40)=""/66, 0x42}, {&(0x7f0000000ec0)=""/210, 0xd2}, {&(0x7f0000000fc0)=""/156, 0x9c}], 0x5, 0x0, 0x0, 0x8000}, 0x20000050) io_setup(0x2, &(0x7f0000001140)) accept$unix(r2, 0x0, &(0x7f0000001180)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000011c0)={r5, 0x9, 0x77, 0xa, 0x9, 0x10000}, &(0x7f0000001200)=0x14) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) ioctl$KVM_SMI(r2, 0xaeb7) fremovexattr(r3, &(0x7f0000001240)=@known='trusted.overlay.nlink\x00') ioctl$KVM_ASSIGN_SET_MSIX_NR(r2, 0x4008ae73, &(0x7f0000001280)={0x6, 0x3}) ioctl$BLKBSZSET(r2, 0x40081271, &(0x7f00000012c0)=0x5) 12:06:55 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x1a0f000000000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 801.176751] hfs: unable to load codepage "none" [ 801.181904] hfs: unable to parse mount options 12:06:55 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x181000, 0x0) r1 = accept4$rose(r0, &(0x7f0000000180)=@full={0xb, @dev, @bcast, 0x0, [@bcast, @bcast, @rose, @bcast, @rose, @netrom]}, &(0x7f00000001c0)=0x40, 0x800) socket$nl_xfrm(0x10, 0x3, 0x6) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x1, 0x0) setsockopt$inet6_buf(r2, 0x29, 0x6, &(0x7f0000000040)="86d6b2111dcdb4830711165dac8ef568121d9c14b427713e4f9206700f90677ce7550c0b57aa3dd08b3491415bd94969b8b4536f848e58e947b01e847ca91dd2e08291c177dc9a53bde3b91eb47f4f889b40a50a10a06a68779180c27c9754f42c7fe24ea3d5852556acadc105", 0x6d) mkdir(0x0, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f00000000c0), &(0x7f0000000100)=0x4) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r1, &(0x7f0000000a40)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0x7f, 0x100, 0x3, 0x7, 0x3, 0x0, 0x9, 0x3e0, 0x38, 0x2f5, 0x9, 0x9, 0x20, 0x1, 0x3, 0x5, 0x4}, [{0x60000000, 0x0, 0x1, 0x5, 0x1, 0x1, 0x8, 0x1}, {0x6474e551, 0x0, 0x6, 0x1, 0x1, 0x297, 0x0, 0x80000001}], "fb9948f551f99d60cf32d4880125dac8c9635fc511a06f8fdc978cf2c6a0832092de2d8269d455cf7b1bed092299f3ed7808edbeee6eaeb866087e84c45f831f93b6dda93ac3edd0eb61aa56d6a524b7666d8dcf448ae29c2655e4ec6519197f7bf2362f1153f721851eaa2cdca39a72354812e1e49f118df36b42da9841bacac46a8d2d953fa5f1a802b3560c5408e46e8757dc4b3be7ecfaccb98543e6fb39c7249f2c8b600dbc08277231425cf1bedce2751b8fd8ffeb1434bc546f58637417b47fe52eb4", [[], [], [], [], [], [], []]}, 0x83e) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000200)=ANY=[@ANYBLOB="010802df", @ANYRES32=0x0], &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000280)={r3, 0xadd4}, 0x8) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 801.256122] hfs: unable to load codepage "none" 12:06:55 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000001180)=@broute={'broute\x00', 0x20, 0x3, 0xf68, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000200], 0x0, &(0x7f0000000100), &(0x7f0000001240)=ANY=[@ANYBLOB="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"]}, 0x107f) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc3f3188a070") pwritev(r0, &(0x7f0000000740)=[{&(0x7f0000000280)="16f1e4df74261e086fb01b34a733590b8e3e9d021eeca3aecfb330c045d1c74b5bceabb0c81c0e21d2881c290b4ad2c6c3b956a74d72523d68451f0ba8725735a76e855015cec0ec8229e47c9b8c3d7c28340840ba8f6ebc7f5c06b2c9399c3b55ff9b515f727260d10bd48b607d4f78e9b7e7529e540151ae637fabfa34679ab610199f366a02f73618e42114531d8f011bc087", 0x94}, {&(0x7f0000000340)="b41b7e990528032bdae90ab1c64840b0f5610c98b3a445e1b1a78bab27067b326e4ca3cb7a2ba638f73d2ea821c514c862bbcd13b098ab3e6930d65c32a2d991c6561adcbe1358895bdb1641315bba80dd313237a5540bf288a114370e01438da47143f6246851b744b2ef315c0adb589bdcd59c52639bb8e5e7096eaf43945f91f0ef8233350469c0282b55e9947b78535af3a4ba590b062e4c144ec1420e35a5a9cd2453769e244cabe10a54fd12330ab26332be5fd43d62001f158c0d7a31718553e2f8583ccc54b05ec499d8e09500a1eac8ea72bbb787627dbb4b3935f13652bc49ee1ef7317c", 0xe9}, {&(0x7f0000000440)="d6354c32c65db70e3390d6a24099c3a34bc609693b8bd4cc8489c941e6e908947d7ef6df7b734eb5202aaa7793988fdf80517a077058b35f7f5ff5f92623db00f195ccc8496d40908c9790d0a25bd9e92ab9a7895476b7f02cc693747d5082d851f22ccfce7e2238d868c31c9bf94c0b7793a451ad0440991d49fbdae688750396d345ba43e6b7becb5991", 0x8b}, {&(0x7f0000000500)="d6fd22127e4fa9db535339596186ede54948e6980cb2851d3f47e011a92108dd5df26e02649335a2e36fc9f1a74c9912", 0x30}, {&(0x7f0000000540)="1f2a6ef1e6d161c22cdb9166563897ebbc36c842c2daed573b96685454e4ff89b32b82a122a1878a2bb1485a924e60e3867b8f65b3d2aa0dbc3a0713560d2d83674857c4be6ee65438f0bef535af37d84988899a0c7cc2b7a6e70b49ae1f14b81a87f6ec6470516710c6456a1bf2494e0cecb25fd779017f59c7e5cc9333e03ef2c3dbd87b2d3fc0fcae6de3de0a2e9f46971e77adedeb8ac0fe2a87b275782095bb9ebf6c5ad80480e322769911093b8bdbe1eb4d172760db939d05a5aa1353b8449ab2b99df33d632bac8171339d0a1206b306e7b131e97191893260d9f8", 0xdf}, {&(0x7f0000000640)="e00a77ef03ece498cab7c4417bebc02ad3089ffafd5a389a05fc1f1e8e4d288341c567d988c3d4e32feeae49535a22accee035ddf6ca14e42044568894a1c614d2a4175e2c51f3f47b4f5ec293421e13bc7390a4d4bc8e95717085e738f55efecfe958578d0319c3685328a4ce70929ded0091e3c25cf35d3d69d6400435eb7c933bfd3e3b218be4490c69c3ab22324cf87b3f4768aaa4dc1bf6c8df8c222fa2ed5449a064733b114e474a4e7e1a74e4f92d94c51c5db72e2bc6726ae163eb785d7c2ebc217c61633fc44b55c03f29fff72a9439df62cdc1ca0c7e", 0xdb}], 0x6, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r0, 0x4010ae68, &(0x7f0000000240)={0x7000}) r4 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r5+30000000}}, 0x0) ioctl$TIOCCONS(r1, 0x541d) readv(r3, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) dup3(r2, r3, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f0000000200)) tkill(r4, 0x1000000000014) [ 801.299724] hfs: unable to parse mount options 12:06:55 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x380, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.events\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$KVM_GET_FPU(r1, 0x81a0ae8c, &(0x7f0000000080)) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x40000, 0x0, 0x0, 0x4000000000000, &(0x7f0000001b80)=ANY=[@ANYBLOB='codepage=none, ']) 12:06:55 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x1f00000000000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:55 executing program 2: unshare(0x100) sched_setaffinity(0x0, 0x0, 0x0) r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000040)={0x1, 0x0, {0x6, 0x3dc, 0x300f, 0x5, 0x6, 0x6, 0x0, 0x3}}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000140)={0x400, "0a5d423272640a4bf8844a0644ca50c69bf6b0f89bef416dcdf320b6c23c7e0b", 0x3, 0x4, 0x7, 0x3c00000, 0x800, 0x2}) 12:06:55 executing program 4: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="3300000007ffff160065491633000080"], 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x1000, &(0x7f0000000640)=ANY=[@ANYBLOB="746c026534d0a5bbe372666408003d", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',version=9p2000,\x00']) socket$can_raw(0x1d, 0x3, 0x1) r2 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x2, 0x2) write$FUSE_BMAP(r2, &(0x7f0000000180)={0x18, 0xfffffffffffffff5, 0x8, {0x101}}, 0x18) 12:06:55 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:55 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) sched_setscheduler(r1, 0x3, &(0x7f0000000040)=0x1) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/174, 0xae}, {&(0x7f0000000140)=""/47, 0x2f}, {&(0x7f0000000180)=""/54, 0x36}], 0x3, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:55 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000000)={{{@in6=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) socket$can_bcm(0x1d, 0x2, 0x2) syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd, &(0x7f0000000280)=ANY=[@ANYBLOB="636f6465706167653d6e6f6e652c61707072616973652c7569643e97cecffcf069891493ccc2ea253e48e3173faf5bcf1115c115c4a6de55e8b62eeaf1be2867a7bd241173fbc37ee85fedb013f2fd7fa11e4ef04c50463a44f70d9395912495e6ea8091763a16b9303ccbb38e1fa6039c15a1d04333e30722283fb2eadf0cf59b5bc4e5b4fce47e6156e9247a503022c56657a3e2e1b146bdf5e721c0f4d1d252d220a104454038977e28f82b5f335ab900", @ANYRESDEC=r0, @ANYBLOB="2c6673757569643d3e7f6677613077762d7e6162712d777e35302d773037002d3376387f613339752c7569643e", @ANYRESDEC=r0, @ANYBLOB=',dont_appraise,dont_appraise,\x00']) 12:06:55 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000440), 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) r1 = syz_open_dev$mice(0x0, 0x0, 0x200000) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000700)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, 0x0, 0x2020) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f00000003c0)={0x0, &(0x7f0000000340)=""/115}) fremovexattr(r0, &(0x7f00000006c0)=@known='system.sockprotoname\x00') openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000740)='/dev/ubi_ctrl\x00', 0x10000, 0x0) exit_group(0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000780)=""/15) r3 = shmget$private(0x0, 0x3000, 0x1000, &(0x7f0000ffc000/0x3000)=nil) getresuid(&(0x7f00000000c0), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000480)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast1}}, &(0x7f0000000400)=0xe8) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) shmctl$IPC_SET(r3, 0x1, &(0x7f0000000640)={{0xe52a, r4, r5, r6, r7, 0xc0, 0xffffffff80000001}, 0x6, 0x7697, 0x1000, 0x7, r2, r2, 0x1}) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0xffffffffffffff05, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) 12:06:55 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0xa401, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000140), 0x4) sched_setaffinity(0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:55 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x2010000000000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:55 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0xfffffffffffffffd) semget(0x0, 0x4, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000), &(0x7f0000000040)=0x4) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74f, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:56 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40000, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20500000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x98, r1, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x84, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x908c}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5ef13c1d}]}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:56 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000001180)=@broute={'broute\x00', 0x20, 0x3, 0xf68, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000200], 0x0, &(0x7f0000000100), &(0x7f0000001240)=ANY=[@ANYBLOB="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"]}, 0x107f) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc3f3188a070") pwritev(r0, &(0x7f0000000740)=[{&(0x7f0000000280)="16f1e4df74261e086fb01b34a733590b8e3e9d021eeca3aecfb330c045d1c74b5bceabb0c81c0e21d2881c290b4ad2c6c3b956a74d72523d68451f0ba8725735a76e855015cec0ec8229e47c9b8c3d7c28340840ba8f6ebc7f5c06b2c9399c3b55ff9b515f727260d10bd48b607d4f78e9b7e7529e540151ae637fabfa34679ab610199f366a02f73618e42114531d8f011bc087", 0x94}, {&(0x7f0000000340)="b41b7e990528032bdae90ab1c64840b0f5610c98b3a445e1b1a78bab27067b326e4ca3cb7a2ba638f73d2ea821c514c862bbcd13b098ab3e6930d65c32a2d991c6561adcbe1358895bdb1641315bba80dd313237a5540bf288a114370e01438da47143f6246851b744b2ef315c0adb589bdcd59c52639bb8e5e7096eaf43945f91f0ef8233350469c0282b55e9947b78535af3a4ba590b062e4c144ec1420e35a5a9cd2453769e244cabe10a54fd12330ab26332be5fd43d62001f158c0d7a31718553e2f8583ccc54b05ec499d8e09500a1eac8ea72bbb787627dbb4b3935f13652bc49ee1ef7317c", 0xe9}, {&(0x7f0000000440)="d6354c32c65db70e3390d6a24099c3a34bc609693b8bd4cc8489c941e6e908947d7ef6df7b734eb5202aaa7793988fdf80517a077058b35f7f5ff5f92623db00f195ccc8496d40908c9790d0a25bd9e92ab9a7895476b7f02cc693747d5082d851f22ccfce7e2238d868c31c9bf94c0b7793a451ad0440991d49fbdae688750396d345ba43e6b7becb5991", 0x8b}, {&(0x7f0000000500)="d6fd22127e4fa9db535339596186ede54948e6980cb2851d3f47e011a92108dd5df26e02649335a2e36fc9f1a74c9912", 0x30}, {&(0x7f0000000540)="1f2a6ef1e6d161c22cdb9166563897ebbc36c842c2daed573b96685454e4ff89b32b82a122a1878a2bb1485a924e60e3867b8f65b3d2aa0dbc3a0713560d2d83674857c4be6ee65438f0bef535af37d84988899a0c7cc2b7a6e70b49ae1f14b81a87f6ec6470516710c6456a1bf2494e0cecb25fd779017f59c7e5cc9333e03ef2c3dbd87b2d3fc0fcae6de3de0a2e9f46971e77adedeb8ac0fe2a87b275782095bb9ebf6c5ad80480e322769911093b8bdbe1eb4d172760db939d05a5aa1353b8449ab2b99df33d632bac8171339d0a1206b306e7b131e97191893260d9f8", 0xdf}, {&(0x7f0000000640)="e00a77ef03ece498cab7c4417bebc02ad3089ffafd5a389a05fc1f1e8e4d288341c567d988c3d4e32feeae49535a22accee035ddf6ca14e42044568894a1c614d2a4175e2c51f3f47b4f5ec293421e13bc7390a4d4bc8e95717085e738f55efecfe958578d0319c3685328a4ce70929ded0091e3c25cf35d3d69d6400435eb7c933bfd3e3b218be4490c69c3ab22324cf87b3f4768aaa4dc1bf6c8df8c222fa2ed5449a064733b114e474a4e7e1a74e4f92d94c51c5db72e2bc6726ae163eb785d7c2ebc217c61633fc44b55c03f29fff72a9439df62cdc1ca0c7e", 0xdb}], 0x6, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r0, 0x4010ae68, &(0x7f0000000240)={0x7000}) r4 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r5+30000000}}, 0x0) ioctl$TIOCCONS(r1, 0x541d) readv(r3, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) dup3(r2, r3, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f0000000200)) tkill(r4, 0x1000000000014) 12:06:56 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x1, 0x2) pipe2(&(0x7f00000001c0), 0x80000) r0 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0xbd, 0x101002) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x20000, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x40, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000240)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000140)=0x0) sched_setaffinity(r2, 0xffffffffffffff2a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x482400, 0x0) ioctl$CAPI_CLR_FLAGS(r3, 0x80044325, &(0x7f0000000040)) 12:06:56 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:56 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 12:06:56 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000440), 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) r1 = syz_open_dev$mice(0x0, 0x0, 0x200000) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000700)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, 0x0, 0x2020) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f00000003c0)={0x0, &(0x7f0000000340)=""/115}) fremovexattr(r0, &(0x7f00000006c0)=@known='system.sockprotoname\x00') openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000740)='/dev/ubi_ctrl\x00', 0x10000, 0x0) exit_group(0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000780)=""/15) r3 = shmget$private(0x0, 0x3000, 0x1000, &(0x7f0000ffc000/0x3000)=nil) getresuid(&(0x7f00000000c0), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000480)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast1}}, &(0x7f0000000400)=0xe8) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) shmctl$IPC_SET(r3, 0x1, &(0x7f0000000640)={{0xe52a, r4, r5, r6, r7, 0xc0, 0xffffffff80000001}, 0x6, 0x7697, 0x1000, 0x7, r2, r2, 0x1}) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0xffffffffffffff05, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) 12:06:56 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 802.606704] hfs: can't find a HFS filesystem on dev loop5 [ 802.702837] hfs: can't find a HFS filesystem on dev loop5 12:06:56 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000440), 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) r1 = syz_open_dev$mice(0x0, 0x0, 0x200000) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000700)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, 0x0, 0x2020) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f00000003c0)={0x0, &(0x7f0000000340)=""/115}) fremovexattr(r0, &(0x7f00000006c0)=@known='system.sockprotoname\x00') openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000740)='/dev/ubi_ctrl\x00', 0x10000, 0x0) exit_group(0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000780)=""/15) r3 = shmget$private(0x0, 0x3000, 0x1000, &(0x7f0000ffc000/0x3000)=nil) getresuid(&(0x7f00000000c0), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000480)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast1}}, &(0x7f0000000400)=0xe8) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) shmctl$IPC_SET(r3, 0x1, &(0x7f0000000640)={{0xe52a, r4, r5, r6, r7, 0xc0, 0xffffffff80000001}, 0x6, 0x7697, 0x1000, 0x7, r2, r2, 0x1}) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0xffffffffffffff05, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) 12:06:56 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:56 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff}) fcntl$setstatus(r0, 0x4, 0x42800) socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:56 executing program 2: getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) lchown(&(0x7f0000000000)='./file0\x00', r2, r4) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000280)={0x6, 0x0, 0x2, 0x31}) ioctl$DRM_IOCTL_SG_ALLOC(r5, 0xc0106438, &(0x7f00000002c0)={0xffffffff, r6}) rt_tgsigqueueinfo(r3, r3, 0x22, &(0x7f0000000480)={0x2d, 0x258, 0xfffffffffffffff7}) fsetxattr$security_smack_transmute(r5, &(0x7f0000000380)='security.SMACK64TRANSMUTE\x00', &(0x7f00000003c0)='TRUE', 0x4, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000003940)=@broute={'broute\x00', 0x20, 0x2, 0x318, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20003600], 0x0, &(0x7f00000035c0), &(0x7f0000003600)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x50, 0x0, 'vxcan1\x00', 'erspan0\x00', 'veth1_to_bond\x00', 'bond0\x00', @remote, [0xff, 0x0, 0xff, 0x0, 0xff, 0xff], @local, [0xff, 0xff, 0xff, 0xff], 0xa0, 0xa0, 0xd8, [@m802_3={'802_3\x00', 0x8, {{0x0, 0x4, 0x6, 0x3}}}]}}, @common=@dnat={'dnat\x00', 0x10, {{@dev={[], 0x2a}, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x13, 0x8, 0xeef7, 'vcan0\x00', 'batadv0\x00', 'vxcan1\x00', 'vlan0\x00', @random="2b0ad7e762c3", [0x0, 0x0, 0x0, 0xff, 0xff], @random="c97cadafadf8", [0xff, 0xff, 0x0, 0x0, 0xff, 0xff], 0xf0, 0x180, 0x1b0, [@m802_3={'802_3\x00', 0x8, {{0xf8, 0xfff, 0x1, 0x1}}}, @nfacct={'nfacct\x00', 0x28, {{'syz1\x00', 0x7}}}]}, [@common=@ERROR={'ERROR\x00', 0x20, {"986400dfa996f7576b67849fa95a82bfe573b20e4610f1cba83c5dc5b155"}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xffffffffffffffff, 0x8000, 0x1}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}]}, 0x390) sched_setaffinity(0x0, 0x0, 0x0) setrlimit(0x4, &(0x7f0000000340)={0xd5a, 0x4}) ioctl$BLKPBSZGET(r5, 0x127b, &(0x7f0000000300)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r5, 0x84, 0x6c, &(0x7f0000003500)=ANY=[@ANYRES32=0x0, @ANYBLOB="5500000097e545d1cdfa8e69a2b7bfd8000ac35c61c6be41b60b2b6fc30622ac5fe88502000000000000b167f9a39774950bd028ae77346fc2e968ca5e767dc33965003074a5a84191b1dfc9ca83d9b48e258052b19aec5bf57caa308cfe600ec81bcba7154dabd7ddbebce2c66325247056986a6b2d2d19e4b6ce5b6f95b8263534f86d8d7cb1830524a9d1bac5ecf082d0c4c6599356955f1fc61922bc8b"], &(0x7f0000000500)=0x5d) sendmsg$netlink(r5, &(0x7f0000000900)={&(0x7f0000000580)=@proc={0x10, 0x0, 0x25dfdbff, 0xc4080000}, 0xc, &(0x7f0000003380)=[{&(0x7f00000005c0)={0x2c, 0x16, 0x400, 0x70bd2b, 0x25dfdbfc, "", [@typed={0x14, 0x7b, @ipv6=@loopback}, @typed={0x8, 0x6a, @uid=r2}]}, 0x2c}, {&(0x7f0000000600)={0x10, 0x15, 0x300, 0x70bd25, 0x25dfdbfd}, 0x10}, {&(0x7f0000000640)={0x2b4, 0x34, 0x300, 0x70bd27, 0x25dfdbfe, "", [@generic="35424bee69b3d525770927b3d5554db9", @generic="f618dba025609a4ace1992512e0fd9fd19517a58bc43e6adf73c45ddfc9d4d0844a062d799cd0ba289277c0610fc4852e08b95af7a4e84ae840763866796a4933ef730394181a37de8801ac1e2f50e88c44ecb448d898c07a12d6c7ec962871ee997d55c5e584f0b5cb0f5ecf550c4ca8d5de333e0f51a4319c70b77fb14090ee40d0c9c8039dd929f29e48e729bae342a553452b9d71341ff899bb9f640cd5178e33035257882f3e367b7d61f6e9dc63a64ff4b96d429a9903f3d7dc4306d85723be2b8c98dd5a2a3cf60cafb822bdc5735", @generic="172791e3589af6161dde381dd71e2bef6283c783fab8aa898ef1aa9bf0a17c9a3262c46291fa8fe7113f05a750307217dc83349677db77f918033ca2aeaf1df0482302142c903a93bfc1b8c6e4d5530d4b686700a8d73239f190ff3c5262a926cb8f808ba270d25d5f598b85e82bb148781661f5691e36a99dfb77b2540b15bc2f1c2772565eab2d7a4e2821ecc6efefb220f5fc1ae50fb48ddad406641f96b452473a811873a351186a691fe897e6197ccad2ca2ffe4dcb3fcf2fcd20c403943db7a0cc042a140218d1c0324994e6b9b27aabb594956ce1a4b701c03acd5809a433f36b833bd27074fce20cf4768a02e7c44ff1", @typed={0x8, 0x7c, @fd=r5}, @generic="b18a3f9616fbc744a44d7e89ecb23c54b0a200d05533e66b04763a53670ed874f40962d384839c4c92a7d656a749aa91b92e42f685e22921feef5cc8cbe897a6668d3511336c929d8d5a3125d0dc66e5f5c3e7493ce1afaaece03bbffd931eb3ef9a026337e9bb731bc6125cc47ec45bb180079fab48f539bd5129519fca364bb6d751616ff28f8ef43076567aea4105a78cbb0778687a9c458333d560173241f7e2ac02951e75683cb964bff4d162fd1e849f9a6a4bf4b59812349d2b4ed92eb566e4"]}, 0x2b4}, {&(0x7f0000000a40)={0x464, 0x33, 0x24, 0x70bd2b, 0x25dfdbfe, "", [@generic="c3a09995972bb158af8fa360703123343e893fef28577f1c2add16fdbcc3d21e4c1c6b2b2ba9177f32572c1f512425edcb4051fc965d2491caeb3bd70da6e3cd21ce1616a029efbd464a768f4b1478ff9abfe89c97297cff003888e80f7d5fb07bf71d0cd9c87c326b", @nested={0x4, 0x6f}, @nested={0x248, 0x1e, [@generic="c5825ab8cdd6dc42be87818dd75d7928f30dd3da5cf0b6f97520270fbfeb999246a4529825abd42eac86364112c3b0f0559d12a03fabe47999598e17d1403a4c7cbf3f4c4ff053ce9b3c60bf097431d43d01d270d7126284f4408073d2d07be3f925f0332066e08a4bff20b8f7645f03e0e8856232141635a25f2df58092f4875839c282d4ee7dd48f3bb636be30c7eba93dca05b92c4b7ef89330a71704c1498d9e5e72d7d642d34aeef50d154b8803a24e1a3c2f2fbfe6ce20fe5c5634533df6adfd8ae5e250109f3c8080d043ef4b9acfe108e36fa9cd23b0b1cdb162bc88", @generic="b35e269910404ff27c51a724bb960d9b8647e97b673434a7326982b0f8265cb5ce4514630b5f0bf309e5a4dcdc35f868c5bc44112faacc5ff682e0c04dad76a91f6c04c60da1becbb9c9ed2d8f1729ce749714089df9951edda89ff8c223c12faf2e99dc0a4976c0740c942784885e6fe9382f2b12cc2f5b14afa376940c26bd458c9e24be497304dc2552d71a8e411a29f1728f322a15366c6ecfb6c072d3771356638a6caf", @generic="9d0c4efb00c0b35ec858215335a66df82ea1ddc981c7b2324172910a73caf52ec69ba45cb3d992140be90be0ff98c823c37b2f", @typed={0x8, 0x19, @ipv4=@remote}, @typed={0x8, 0x13, @u32=0x9}, @typed={0x8, 0x5f, @u32=0x6}, @generic="77a00f20027db254123ee285f1c7fd2196dcb6a6b63b1e66ef3915794308b279c6b1f000fa998b60c6838da79ec367adb265a339f5d64b46cb178b87a9fd030f7f66e634ce76f442ef419659c0e76c5e46b79580c60dd947b4c8464cde0b0f47da4e5f903a09694c", @generic="af58b0ad63f694b00b35"]}, @generic="c1501875ec06e3163cc01472ea9a4ebc337128cc6aa2df011a36429799df7183c3c7bee41ebfe1da40d5c6a13cb86057482f1fbf0b5e8473b7be3bdc24c63ea37273d859cabb3f0c034e1b27bc909566776c5f751acb53388a44a4f7854af43dc7fe427f9d81a30cb37aeb7456df1f51c087227f0fe15c12a92cac695756cf63c17716eb979ea00e90ea97dce0d280f1d4d25b1abb96d94121a3eb8d1996ae5a6c17002c138f2670f86d", @typed={0xf4, 0x1c, @binary="a8f671d7ce1a97e7b7fbd7cb9e4bc1f19394b6b3d93157cb170f06d62178df0cf2ee10b3577f28c2f451fe1fcda28e20bd6c51a6c1160056985bed02e3eca6968ec3c9c7c56fb09bb698ff03d5b5667ca80bf8bc6a40b50790652df5abe56fa8d380d1441cb7fa443f14327679e14cff6d1efc503858ab2a4cb1f54dfc488d567254dd649bd1d63d00e827e1e2cd8d34a2519b46269a86b2b0079a5ce2282a2945327a2ef4ececa9151be3f481418899c528696240f94fd0631ad65c0edf9ccdfe260a1e9e6c158cbf8f3ee2f2e2596f690cb61818e3f70201cec512eb5752ffd6e90beb118740791f75b0259b83"}]}, 0x464}, {&(0x7f0000000ec0)={0x1160, 0x1c, 0x300, 0x70bd2c, 0x25dfdbff, "", [@nested={0x20, 0x24, [@generic="3a3ca82a07be0a9be54c7d9447f95e452260e45de157ad020e12"]}, @typed={0xd0, 0x49, @binary="c324fc741207e2e07cef8faed5300a95656c477fc4c46050d0771e44409dc73c6218e24b45ed93b586811e1bedd7f2aff4ee0fb9b5a0ba10fae985d56df25de64092b6039fc35e11a05ff292fdd3580b8f68a4d1e5176d041eed8c0a978091903084c9535cd00824454803c97c8763c53f66e95aa464c942a81f1b3ee74d976143a2cf08c00341b17c129821fff51cf0b9dca2c4c746d7ffc35ebbde4f4a417756102ea4e8dbdf56876975d92790cd2a64554ef210c87ba7eeb7e57febcbf0eebcd450278bbb41f42153db"}, @generic="dd83f9d6b46756cedea9da2edb1177799d4bdfb168314602bf48a01df42005d1da493898a8a277c61ffe861bcbb960def6bd9f03fb998f27a8df6440520003ea7e0d3bbb911bfe02ac120cf82a52c6f1c22d840d63b95693de", @nested={0x4, 0xd}, @generic="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"]}, 0x1160}, {&(0x7f0000002040)={0x1330, 0x1c, 0xb10, 0x70bd2c, 0x25dfdbfd, "", [@nested={0x1310, 0x47, [@generic="00e876aec83bbf1b112a223c8076cfaaa8946437a3bb889a52b888b6fffdc447f66eb7156cf3e362c58e09f430b647e7445afae0974aba93b31f0c192356aff5cbb81e832e48826ede7f9b31219601e6d51e59d36717e8389a5b9408b9ad4d686e5e58032818fa2fa4d888f983b061cb45612969444491efbc40084c9e39d7572e3789b6cf8d4df18aed82d572c7d80434549d1eff54bcb7c8ef33e75b5f5253d73b1696da714f7a02200908ea7961a05adcb7e4c47fee80c2bea255e157184d3040b5fce740d0461310c6ba1339c148b32568daca1aac1fc6ba004392bfc71eb0d5", @typed={0x4, 0x6b}, @typed={0x8, 0x64, @ipv4=@broadcast}, @typed={0xc, 0x3d, @u64=0x8001}, @generic="ed0448fda439e68d8114b07db62f26eb74b9a5cf96a747a3149b3452f9d4aa72f3f2", @generic="b0b4b08bc105d623d66ba7f1e870a36e324f0f7d5ddc3f97247394a1f1205bc02b275a0c3d51fcbc4eacc11614ba55ccb6a663548f72bdeac57f034e4675cf91d90ce4b24059cbd34bd829f29f0775aca12b0b12", @generic="c298b17436515efb301392a6b0c3502853b1e6a552467444c204a82b1dc339800bfc2846a67db4c0c523edb0f250a59c1068789d0be872ec5a801e79269024caf21cee5a209b972e19283c479355fbe2b67c9113e1ddd9b6722108cfd4aa54690142187dc6be5dbf870c016ba7159f5f7e80ddf9c69a57e5825c7337", @generic="a400c065d8420a42b9f394a2da34fa0af597fa579d7d06c39ff18b7ace5ab17ad54faa3f3e6dbc93c2d8b097727e1b9110571d4292b5b4e26504c94a3039f9758ff8fe345fdeaed8ac5edeb8ccde629d619e4fdd21b78817343ec1149e09d5781017ce78cefe978b8900754a0a9af84bfa583c7e08ba4d4339178747c3fa1e343d2d98dae11e22554f5cf1fc26eba97de60f75b8bd8e59a80df0fccbb02ade0cd397323181d674dd752a972201fe84db22b9a657bd4f602b0129338246b41a699fcbb44001968e99d3b89fe247e26bd4b6b9af5cf7a6bed46e85485fc6fe62e249d3406914e954a5b1baa676a6edd3fe1020ca314c65211daf135f4817018287efd981a1e702b113b886dc382a1cd852bc25c27e082d23615b0724d557d61c3bda3cab0a1d58903f84e8a4b1e3a925cb26f516644082007c5ae08985206219266cf224f751f26068c86b8e8846f6a91c53a454a40e265f925f4e4e20f69fe0138d5d4072cb26ff85bb6d244e95b3b9522e403eb9ec88a366223047185ea5cf4a44ce03ae71fbb7ea97eacc37d385fff457149840cbca8ec5c381ab007983c8e9140a830a59afaeb568391857d8ed7bdac82143f3489691caa92bd1fb77907042c5e738a9a603c430bcda351834860ee63ceba3de32a09d044575e4abf47a0de7974e6b23924805b9058217ee0f8a4f8b35fbbae6bc5a5e9867b562d1936927530a0d4911d8ca19e1e3d301103b68a71f9757521eaccf749d6d38a4555fbb40a245d8141d9fa3c5517b83436c68acd2fff157cdbfebfa3146b1a6f073858dfd8ecc680e942bfedfc00367e1f42d360278a5edd01ebeeb4945ea24dfc59d1ac44d1d130a2de618681885f3f02954f0a9d6ab87b5ddefd2e99f7647e8f3a8462d8ea2d87f7d27a91b663fd2c7b9977a37dfa26110956326dd1cef6034fc71cdfa8fed5648f81e79a23b23a13978dfdc20298764e8a5c1e2c6e3f32a4db660ae668bf2969912f1df221aca1e76db966fdb6a9b01654164f347fe474322f91253ba4c14d5c585fc55f5ed6037710a969ef7f4f70c0729b1ecf013aa014ec818ee962323672c3bbc3038d4c3ffd864d018444a0cb064066038f51a0b165547c555d147ea4b9753b53b6948560d1beb38cb8ff65cf4350bc45d7833d7c3e30a6aca8e1bd232c1e1a9409fe301581c9761598c0eae979a5bf94c1c8fd363b0f9f6b0bef152268eb72070fe02cbc65d0ae1756c8172e092125a0979c41faac948ff712b83125791d23580116e871bf9cb9ccd115484b83dc0ff27257646c858e81cb0a0a4d2c7596188c48ea5887de97bf31aea4d3342fa571e7d0c028a72c22f17c0f0ae87c8d7b3cbc16881511878e269190194cc304f869a9546444b1237d48165ba20399eafd73c1bdedfe8147bf57e12481160ad15904f8b1ab96e0c37eb8e5f870cfe7b1760d860a1594cc25927b694c85e44675b74d24efae10094fa50f5405a0931455a0b0a2569b2f5402f8acdd33c0e328d2acaf4533fafbd3ab80f6546b32745c718c753c9177db6efb2f394ba55c4178c187d3c08d90699632aaf0089ad961cf8a87225122eff62d573eb619dcf5548a5453b86950d6b3a701cbdc52218b25987fd31b61f5bf548631631f4d2701ddae0177dcd67c7c314788e7e589a5cdebd924c68bedee729de28bd861f1e294592a2e5184cd20a78ca67438795b86707613d6fe16f879592f67b9b1620c0969b353ca5c786b460dec9390c212997a8a36d4cad762fb6fb851713cbcf4fb9455c81493413fe1a38cd401d10ecc279a13668a9a5330af2c63e5ba88416c7af880f71e720d9429e4495839979b9d51c20baf5de794c53f468c400767091bfd1abf60b9786befe5123b1f6173a41de881f50e3f713261fe940a0e62f444fae5d3aab344cf0cab444ddc27f04b8cbe22ade782c43c8d5ad74dc9c0671c8fac745d3ba4681fe08ab1b2c3916b71c384132e4b9a1e0f9fb77f0dd6378565b5588551974a68e92c18f2e5333b92c6d81fb83ee434f9cc2c1be6c4ac81c300ff0d7e5a90b7657ed45b5db6dbb8c8f21b436dd107c6c215905884ad4d63f277125fc0239dae8f450c9ebe94bb53cbfc39b884c44a9f3c70fdb479822e8fac204a9ef3beb2d5cab0cac9e552c424e6ffce880f05d1723daabbdd78dc0c04b2a980407adc7d4786200c3b017f450b01dd79cd7b75d10d7489beb9aaa2095aefc7ce2d3d7b1eceb456514e19a38b4d7374bf2f77af1e495ba6fc3dadd300cc5710db953269a80fdf88862b23aa2aead1d1ad3ae356939264badc82b559d2985d82b6e5faa8923df87b79b23a856dd3101c1bd3b224e05ffa18c092e14cd227a4542ea0c7d411747cbabed4eb69f9b9e3165c19c3b7c5e3bbf56e68ba7ac0a226b1f013b514805d06819fec99773e32c47e01079857bc5031eca1358e4dad090007b825105335921b25ce09b95b60f465ce5364814b49261e52506e946de931852f0b86df8691e8a0b45dc430f5b366088405d434b19a8bfa814cb8b867f0b6a0cf51c07a936efba09f2f78fe2068a278fb12ebc6eb42812e744704a46a9ebcc4c33f85c6d53934d7d0f21a0fa89e9ceba1ea6797c7a1f3999bb95cadd204fc8a2079aab3dd6722ecace6ddd12aa7029d65ed032f45c022aa22c93557879fd563234e2823745db204724f0676feb21c3fe92018b7f657e0159d30b8f8c6c5653a292818ee6185a9c865f8a5a51c5c339b58620722cce240f5bf2cbd78e5785cbe380131ed6e6b0aa2c890a2a686a2c0eda36022c19ca7448993dc773a6337955f542a8554c3fc2460227762f851ef087ad39bcb536bfd43a1aadd3d079f92f65a1b26d8c61885b21f3a7b5353d7998c086d3ec3c5b3cb9bb4ccc03498dd8786770781842ed568f00adeec9a6f9410b9a8cc02cfa1826a210130f7b4263b845b298b5ad30f5499c1c63b12f5996fce5aa8fe7bc44a017465b5c5957b9c2e284acd3630de165a9d6ca45465aeaf61f6ebfc58b878b0955fa4dd987a6fa9dd2f69bc2da667df9c9d4652b65dcaa49c9291a2ece0b99df471d23bb33be9b8704991d40e165d83c6c51c3676db5a5c841438e9e948afb80cbad140b4a3a678b5d8b35476eda470cadcb1d97bea405793d04a2e5b62f4988100dfc58f5b460c892ef043a4996acb53ca9fcff34616fc983657a17b27dcaa4513f63d20b558bfda79836ca97453af74d07a0e508fc8a6f149861ca634ea909bfc41a78da335de1489c03df870f3d84600c22d44a959abc7105bf4880f29ebeb35aaecbc047ae81c9d20c150f11322d7148556df3aa10f973fea297cffdc2e588aa8242699b76382a14379b4855b4aebfa151a1399c6715f9430ced30a759fb0e697fde10d1e069018a7ab5e19331c1f90f0440d117880028fa864cf097d43222dcbca99bb023533595764e262a79ec73959a33ddd3b92471d3543ce75be2535ba5ea7ffc3792c51809e6953940c7d2f2f977e379274c12fc87619418a1cfa30ed76d492b131d7e779436d7c738668f63315420485c244bea55ee973cd41612343e02d00bc4eddc1fd7070d994164e3feeec5c35d65a751c1e14dbdea0972081b5d6293b0df8ae1f5df7be2de812590b96af0a483049bc70d56763ae1b32907f9a9a55f9bbe3bce36c7fa02f0d53edd80f95cd641efcccc72517f45d2c548f102ab630341c4230a28d89f54055c5e4a41aa9e2af89ed9efd0ea9a0b8784b0f1677aee1ea5822a3f8d61b385057394af8b0f166ea8b7cb22759c163be2dbab57640a2313bb137a4046db933bf9218d1ecf3e3f6dd8f4472039df255e0a6bcb9133cef2f48b96969ca91da6b849c9c08b2a26eb30d9e62eb234d8cf721cc44a1ccd40d2ff8973c51f0997493bfa959a99787302d326d55de7a892c304e26118aeac87ed87dfe3e329e50896cffc15108263f8a67085b08c2f20ad759c9895c12f9113fa0ffdc5f105dcf628bc9731151fd439f42038b659c8e697c53111280a359eb5c2e559e3cd2eb71291bfd08e6966b1f5a8dac10b87bf34b1dfac7fbb79901ce4cc672bcced7364a81b168b0cbc96f9a3906bffcc3338a28aa302a2af651d0f5c22785d5580218cd4ca221ac40811fd8a4f38b3403f9c444da93378a33147093adad7b5563895f581b1254d14091c9fb97717becc0ded3ee9726339bc0615c85180a9094e2d7234717a6db3bf198a3285702b90f2ab90dfb50ad75fa2c4cef4aa05fc02ba50303caf8db0054d85432cd180a3161174ee1990e33ad3cfc8bd75351d9e844a29927d1fe1e92f5c4e8c4447baca5b980854fc3a447d2adf686c284e78a2a71876a5390743afdc5f67b42909f673374ad8ed8c3d8b405d66d524f642821f335535d05c1d6f8d6a78b76d67f2d60a417d2fb784a6a9ce94e6a19da5b4c5b49eafe7a6963bbf78eee49f777fe2a82acdd31dae54b2650620fd15d8f35b36414a89ae28181d6c8184c8401f88ff00a57df91d8d78030eacd643cb01baa3eaebf7ef0e76633f509a08b781b24165101cc68222aae674c783ea95060bc702bcb9dbe1d736c6de3d78bf970647bf677b7847e23efd5ccf7c01f263b0810520a315aebb3139f1933b104bf45250de0b18aeb3cedcc5cc52ea6f8cb1a5e94d4fe53cb79151bbc9acccdd5b60ed97fbb5a3f592cc6a6371a27deb54faed815b363b4660f135b171a3f28d46eb6b9292147e5289d5caaa7d08795f73277c35f4fb097fe7fd69e285d67886d6f8ff4e98f915a8f5903dde631f2152ee822763f5547ab5ee25a715bf1a75a6e3a46905964b244b642bde07540cd7570daf14318a79f2a6f0bed8faa57d6ffc38361cea11e87c6ef8a35294c0de4f7daa8efeded54be55a894a27d59f09c3df3b3faa7df7637eabf67eaf432743eccf5682479d970ecd3ce8b4f58752028b5290a62cffaf586ebb850f1a7ac069e1e02824b516a4e2e0d9cec803cbd227f297c6fa75ae0b54595755ed5776879bc6b4b37c3c5c8bb8e2ce05eb63d1477d78378495cd45a3c566a308c47f90a43c0f05996275b6e97c5eac44c03e9fd4ec1030ab6e852007cb61cb380c8115677b7a51300bba603c9810810cd90507590ab87fadf96aa907759f1f915ceb837269114b569fb57583b5979af21f23bafd440951ae3d0e6babb01ed54ef67aa34f0398a0854b1192530eedcb63dad0170e97bbb4b775633d3a81ed29f0c8ac653730becc630d5b132c9308afc42d74aeb1306bb9f661fc65d1ab5627d8b801ab7b49d857c6dcdd4f31bc171c5add24457ee7bbdab4f5fac6803f399a0f06624a3ab808ab50a57f205be59ab845333833982ceb65a868433e16a4885dd2eb557bcee0d3c9db92fc2f52f53f50476463bbb5d736cf6b352f7ec29bd4a950279649460f0062cd8aa19548607e4185e0fa456ee1b4ce9da0aa351e65f5a68e83be9a6e51ee02945cef8a40abe01087694673a8a38bc546825c986b5546c34fe99fd259447a443053e3b8f8edb156b1e217b42f3f466dac4336b12b26ab2a665c82955d7b305e4b9cbe69a2e6f67fc784a7ec464291de8cf0dea4a6d26077a12e854d1f88f72fdb34ab57394300d4275aab313cb0b795c5635cf30c423cfd40010bd7ced3825a3c1dc5f1b94b61444d7fcec1c6f1efbbfb2fe2749a55077c4839e47951563ec989c826854072e52a58e80007c8a9b540e16c909008d754925c97c8f911e7aa95f4a6461889fbfe11a7f9c1f58591c00e09850ff392d0a135cef6a78bfea1a78c52b3d3c78c8f", @generic="46afe94cd1629109f98950edb61c0450a05abbae4fc2dcf353b74e18fe3ec46e914e90c161e9b4fd090afbdf9a0335fddee0ce0f6f573f4282dfe7504d234bafb2bbe74fd17bfedafe98877e5f91ba1b3072bbf13f44e0cf21fa1f2e8a", @typed={0xc0, 0x95, @binary="c63504b22e8c48990e67c194c1ea46501a3cb6546c50a735df58d808a52946ddb2cdd863913113dd1d9a4dfc0d347bd9dfa9a4dc2f1d64bc091cd82531974a8970a1d821b03ac7221dc45e9274070dc2368288216b571850f3100d0bf63eec0661062d9cd6f2044e37388676184e3c80bc24118719bfd0467a297da0a0f6f00c18c4df23d7caa9a53c3e5de886ebe6d540b0aaedfb13f33c2673ba7b5c824c795307c629e8c3bf91e9a1547db236881ae436886e623789d3f2e799b5"}]}, @typed={0x8, 0x32, @u32=0x80}, @typed={0x8, 0x2b, @u32=0x8001}]}, 0x1330}], 0x6, &(0x7f0000003400)=[@cred={0x20, 0x1, 0x2, r3, r0, r4}, @cred={0x20, 0x1, 0x2, r3, r1, r4}, @rights={0x20, 0x1, 0x1, [r5, r5, r5, r5]}, @cred={0x20, 0x1, 0x2, r3, r1, r4}, @rights={0x18, 0x1, 0x1, [r5]}, @rights={0x18, 0x1, 0x1, [r5]}, @rights={0x20, 0x1, 0x1, [r5, r5, r5, r5]}, @cred={0x20, 0x1, 0x2, r3, r2, r4}], 0xf0, 0x8000}, 0x4048010) setsockopt$inet_sctp_SCTP_AUTH_KEY(r5, 0x84, 0x17, &(0x7f0000000540)={r7, 0x9, 0x35, "65d21e1513e482ee9a83f46dde906c98591999287824aa259668f478b8a236c4784ce77b88c157f4efea75bcc3ae642219a5555b3a"}, 0x3d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) timerfd_gettime(r5, &(0x7f0000000440)) syz_mount_image$erofs(&(0x7f00000039c0)='erofs\x00', &(0x7f0000003a00)='./file0\x00', 0x2, 0x7, &(0x7f0000004e00)=[{&(0x7f0000003a40)="912fff1d1ccc25f1591024e3aac6dc73831bf76c0a41eae2168506de0705a2e10cc0f77abe5ab4f56786d86fd2ac376bb0deea26f481bca9e4eefb45eb8fcc2b819e420bbfa64356c7573957f0e17ce4073a1e5c1f15181bdb26", 0x5a, 0xfff}, {&(0x7f0000003ac0)="50c3601b0be412d6b8cefdafaa612d44dc146bdaa59f2633b02adfe080b38e23d15f38fc6ec04bec8fdc5487e1cfaec375de091e938dda3a2aa1c15450cc3caf3d0026604b4694e28241f176ebf60c3854c3659d9ae626fbd42c6c3f4b0a7f7bc8ffc932def800e25bba7cce917ad167602f7d9b28bf320f65bba379d91e034a555ad658b8c1ac427c2b7f9b737b023fc256b717aec17e625cf33807", 0x9c, 0x59cd}, {&(0x7f0000003b80)="721d5698443fe96b76b805a4c3a0788938282534e4c6a28be1dc9dd833060d0a9c2e43bd059000691047e48e15723dec343e9dda494983b9771efd023d8d82c8ea4bfd411aa75c5c2e6f37977b07443a34a97f380e00838c107d9398cb47e59bc8296be5625387e379199e484c99a66cba98abf9088691c3f128643267d985a995174cc9621eb4f632fe6ca0b1a8d03b7d1229fbf89cdcbb783f228db717832491ca45c158f2c6e7ca17eb7d8dc19df93d3760318cb73f5050de68", 0xbb, 0xeb40}, {&(0x7f0000003c40)="5410e4b44289b0ec9bdecbaa9481828aa2eca5ffc42f5d44bfb6897bcc3f422333a1c22fc80ce59ec8b278ebb889444cc97b0a8131a8cae5c85767bccfbdaa8325ea", 0x42, 0x28f4}, {&(0x7f0000003cc0)="77fc53bea9a7311b2d97638b70fa99e9c3bb72c5e6cd3f938ae8d615bfd9f89c872f", 0x22, 0x2}, {&(0x7f0000003d00)="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", 0x1000, 0xfffffffffffff068}, {&(0x7f0000004d00)="1ed59697e31a65a57c96562cc58376b3f1f7d57c670782d28ed8bfcf7fe52201d9633b93ac30a1d1dd6ec406419197ed6b81d7e53191b6edde15b6d0792c49291caee96669758f3f1843c153dc80719bcffac4408a2bd9b5051b268b8d9def1d24e5a417bd33a1dd9e6fb400a4cd0865157c2b65a45a1d5c9555e383e2d4beeedf3589d9683fe41fbd0e3ee42e25890a5c3262971fadf1863a60ea61e61c7262214635c5c32f82be8c84544f76277b6102f846846b4e2db5b0f9bed4a16204800a176ff994acad2e446cfaa16e5a6f4297889bddb87a91a37c", 0xd9, 0x500000000000}], 0x0, &(0x7f0000004ec0)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x8}}], [{@dont_measure='dont_measure'}, {@obj_role={'obj_role', 0x3d, '\x00'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@smackfshat={'smackfshat', 0x3d, 'security.SMACK64TRANSMUTE\x00'}}, {@dont_measure='dont_measure'}]}) getrusage(0xffffffffffffffff, &(0x7f0000000180)) syz_open_dev$midi(&(0x7f0000000400)='/dev/midi#\x00', 0x1, 0x1f9203) 12:06:56 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="636f6464706167653d6e6fee652c00de048f1cee1e999c427f2f76369a6851dd21212fe9c6d4fd87b3201347d56488541b7dcea83fa4f34bb8ace4f01cb8b92131ff347a42d6e84cf1fa557512a0cb698e7d5b78909396f6e700914ec8e611ccce54de8a48b0020000000000000000000000"]) syz_mount_image$ceph(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x6, &(0x7f0000000440)=[{&(0x7f0000000080)="e8e33e5056d240825b8bcf79efc55e5dbe5e845fc1fa44ac37d52518818d36923ff6c3c997bfc11c666af739ee6c09708d6dcdda5fc1475aecbe8dd6c2bd24d4cfabdfd4605dd400e203ddff69c9b5dcfc1eff29567449f093932d1d093e38de15c7e65bc33f563492a3857f1afdee0dde46533327b2b8b5fedb6dedb97f8f2dd98421ea40ba2952df94c1455933bfd44e81d889ea291df02a3ca1ce020e207e", 0xa0}, {&(0x7f0000000140)="6b1bd8f01f7b200f7ba786d469697cee768c0643be17c55607c32e9050ced0a64ed25132ae243191a2a53b9dca6301e12b03e8ae382b32216d4c4237e3d96d54f4897ddf61dfa95bf287f7ead240ab8fc43ec17a6ccffa414044d56b69818d5edb1e2ca6246abe811cf97c9bb95d61dcc8ccaa2627245cd0691911f9b3b0decd3ba033d554ddd339514e4e4c91408076cc01dc46d7f15f319984fb1abfef77d15328325f05cb9916c3de3a9442f0067060aabd2cfacb1f268ec882ae0067c36023dbe836812821a7d3d9f6cb733381fb7e7236dad015cd0265efd412874ebdc6761d0ecce828504e5e2acaedabfed487eb3c04d30a287173", 0x32b, 0x1}, {&(0x7f0000000240), 0x0, 0x48}, {&(0x7f0000000280), 0x0, 0xd8}, {&(0x7f00000002c0)="2e99c04f0d2b3301792627f2b859c83fbcc74a3bcbaa5be82c59157ad16046e1648c816f39d8c0b148a8e11a6c3445140e0a0bd778de1c007941de92a8bf2250d907de364a0323ac23a9bd502ae38e7175847f7054f0ba351116273d892292a41c57c3254d62eae05054369b61542c8d88613c1fbcb3d5ecb2e2fa9933be97c9a2fc1b48cad00118853f3f98a3d7d5855bf7b85ad93c8ab8d33b72be5ad0c5c476934f63afe23afea71c8aeb143189cbec79371bc0297ce5ed4ce170fbab7098f80000b70e5eb4e7ca9dbf6333f49e61e9696fc83d1f3e90d2bdae71489517b335aae58ea64c251d0a099e4d08d2d469ef1a04", 0xf3, 0xffffffffffffff00}, {&(0x7f00000003c0)="93f08157fc9e2f9635ca14a68d3c40845ac8a797b419da4cfb391247cc594ea5700ec61b2ab504ba5bd8346c4d435535fab2257526d2dba2f8ac0e332131cc448a246f51b0d90de5995c95d601216133a12a3d28c9275a565a7ecb32f81326cc1959", 0x62, 0x1fc}], 0x2008, &(0x7f0000000540)='ceph\x00') 12:06:56 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 802.906177] hfs: unable to parse mount options [ 802.985281] hfs: unable to parse mount options 12:06:57 executing program 3: 12:06:57 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000440), 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) r1 = syz_open_dev$mice(0x0, 0x0, 0x200000) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000700)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) recvmsg$kcm(0xffffffffffffff9c, 0x0, 0x2020) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f00000003c0)={0x0, &(0x7f0000000340)=""/115}) fremovexattr(r0, &(0x7f00000006c0)=@known='system.sockprotoname\x00') openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000740)='/dev/ubi_ctrl\x00', 0x10000, 0x0) exit_group(0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000780)=""/15) r3 = shmget$private(0x0, 0x3000, 0x1000, &(0x7f0000ffc000/0x3000)=nil) getresuid(&(0x7f00000000c0), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000480)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast1}}, &(0x7f0000000400)=0xe8) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) shmctl$IPC_SET(r3, 0x1, &(0x7f0000000640)={{0xe52a, r4, r5, r6, r7, 0xc0, 0xffffffff80000001}, 0x6, 0x7697, 0x1000, 0x7, r2, r2, 0x1}) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0xffffffffffffff05, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) 12:06:57 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x6000000000000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:57 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x10500, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000080)={0xfffffffd, 0x10001, 0xffffffffffffffc1, 0xfffffffffffffffd, 0x8, 0xfffffffffffffffe}) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:57 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) r1 = dup2(r0, r0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000080)=r2) 12:06:57 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x8001, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@tipc, &(0x7f0000000080)=0x80, 0x80000) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e24, @empty}}, [0x7, 0x3, 0x3, 0x400, 0x7fff, 0x9, 0x0, 0x80000001, 0x3, 0xffff, 0x401, 0x6, 0xeaa8, 0x7, 0xff]}, &(0x7f00000001c0)=0x100) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000200)={r1, 0x400, 0x4}, 0x8) 12:06:57 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:57 executing program 3: [ 803.401888] hfs: unable to load codepage "none" [ 803.406908] hfs: unable to parse mount options 12:06:57 executing program 4: [ 803.522802] hfs: unable to load codepage "none" 12:06:57 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000000)={'bcsf0\x00', 0x9}) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:57 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000040), 0x4) sched_setaffinity(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) socket$l2tp(0x18, 0x1, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) prctl$PR_SET_THP_DISABLE(0x29, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000340)=ANY=[], &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @loopback}}, 0x9, 0x401}, &(0x7f0000000180)=0x90) [ 803.586432] hfs: unable to parse mount options 12:06:57 executing program 3: 12:06:57 executing program 4: 12:06:57 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0xfffffffffffffffc, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="636f646570616765eeb46f6e652c00"]) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) 12:06:57 executing program 4: 12:06:57 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.ev\x88]ts\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000040)) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:57 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @remote}, &(0x7f0000000180)=0x10, 0x800) accept$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @initdev}, &(0x7f0000000200)=0x10) r1 = socket$inet6(0xa, 0xa, 0x101) socketpair(0x11, 0x80003, 0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r2, 0x111, 0x3, 0x0, 0x4) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) sendto(r1, &(0x7f0000000000)="37f6021f7f6d9be28fff99b071df79eeea87dd8eaf39e44af03f1c37f2d26567867402e5a03be4ecfe784aa322b7f3ae9330301a486988c26aed02b2f0f647a27582c9338a0f", 0x46, 0x40000, &(0x7f0000000080)=@sco={0x1f, {0x5, 0x100000000, 0x10001, 0x5, 0x2, 0xfff}}, 0x80) syncfs(r1) 12:06:57 executing program 3: [ 803.915398] hfs: unable to parse mount options 12:06:57 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:57 executing program 5: lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='quiet,gi$=', @ANYRESHEX=r0, @ANYBLOB=',session=0x0000000100000001,iocharset=iso8859-14,\x00']) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x2, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x100, 0x0) 12:06:58 executing program 4: 12:06:58 executing program 3: 12:06:58 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 804.142073] hfs: unable to parse mount options 12:06:58 executing program 4: 12:06:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200842, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000100)={0x1, 0x9, [{r0, 0x0, 0xfffffffffffff000, 0xfffffffffffff000}, {r0, 0x0, 0x1000100000000, 0x10000}, {r0, 0x0, 0xfffffffff0016000, 0xfffffffffffff000}, {r0, 0x0, 0x100000000}, {r0, 0x0, 0x8000, 0x100000000}, {r0, 0x0, 0xd000, 0xfffff000}, {r0, 0x0, 0x10000fffff000, 0xfffffffff0001000}, {r0, 0x0, 0xfffffffffffff000, 0x8000}, {r0, 0x0, 0x0, 0xfffff000}]}) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000040)={0x10000, {{0xa, 0x4e20, 0x3ca9afc4, @empty, 0x8851}}}, 0x88) 12:06:58 executing program 3: 12:06:58 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x9, 0x2) recvfrom$llc(r0, &(0x7f0000000a40)=""/4096, 0x1000, 0x10002, &(0x7f0000000140)={0x1a, 0x304, 0x8001, 0x4, 0xd74, 0x4}, 0x10) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$CAPI_GET_FLAGS(r1, 0x80044323, &(0x7f00000000c0)) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000080)=0x0) process_vm_readv(r3, &(0x7f0000000480), 0x10000000000001c5, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) ioctl$KDDISABIO(r1, 0x4b37) 12:06:58 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:58 executing program 5: r0 = syz_open_dev$amidi(&(0x7f0000000300)='/dev/amidi#\x00', 0x800, 0x8080) memfd_create(&(0x7f00000003c0)='none', 0x2) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000440), &(0x7f0000000380)=0xfffffffffffffde0) syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@codepage={'codepage', 0x3d, 'none'}}], [{@subj_role={'subj_role', 0x3d, 'audit'}}]}) r1 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000001c0)=0xe8) mount$9p_virtio(&(0x7f0000000000)='((\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x4000, &(0x7f0000000200)={'trans=virtio,', {[{@privport='privport'}, {@msize={'msize'}}, {@loose='loose'}, {@mmap='mmap'}, {@access_client='access=client'}, {@privport='privport'}], [{@uid_gt={'uid>', r1}}, {@smackfsroot={'smackfsroot', 0x3d, 'codepage'}}, {@euid_lt={'euid<', r2}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@audit='audit'}]}}) 12:06:58 executing program 4: 12:06:58 executing program 3: sched_setaffinity(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) r1 = dup2(r0, r0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000080)=r2) 12:06:58 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x20000, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000001c0)={"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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rfkill\x00', 0x80040, 0x0) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f00000005c0), &(0x7f0000000100)=0x4) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000040)=""/119) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000140)=0xee8, 0x4) 12:06:58 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x97ffffff00000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:58 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x2, 0x0) getsockname$unix(r0, &(0x7f0000000180)=@abs, &(0x7f0000000080)=0x6e) r1 = socket$nl_generic(0x10, 0x3, 0x10) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f0000000140)={0x0, 0xffffffffffffff70, &(0x7f0000000100)={&(0x7f0000000280)={0x2c, r2, 0x15, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x2c}}, 0x0) [ 804.580750] hfs: unable to load codepage "none" [ 804.586829] hfs: unable to parse mount options 12:06:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8000000000000007, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="0000000000000000000000000000000073010000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x2, 0xca, &(0x7f00001a7f05)=""/251, 0x0, 0xfffffffffffffffc}, 0x48) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000200)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 12:06:58 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:58 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet(0x2, 0x2, 0x77be) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000005dc0)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000005e00)=0x28) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000005e40)={r2, 0x100, 0x4, [0x2158, 0x2, 0xffffffff, 0x2]}, 0x10) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f0000000080)={0x16002, &(0x7f0000000040), 0x6, r0, 0x1}) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) finit_module(r3, &(0x7f0000000400)='cpuset(\x00', 0x3) recvmmsg(r4, &(0x7f0000005bc0)=[{{&(0x7f00000000c0)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000000140)=""/3, 0x3}, {&(0x7f0000000180)=""/168, 0xa8}, {&(0x7f0000000240)=""/173, 0xad}], 0x5}, 0x20}, {{&(0x7f0000000380)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000400)}, {&(0x7f00000004c0)=""/178, 0xb2}, {&(0x7f0000000580)=""/160, 0xa0}], 0x3, &(0x7f0000000640)=""/7, 0x7}, 0x3}, {{&(0x7f0000000680)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000002a80)=[{&(0x7f0000000700)=""/180, 0xb4}, {&(0x7f00000007c0)=""/226, 0xe2}, {&(0x7f00000008c0)=""/95, 0x5f}, {&(0x7f0000002a40)=""/27, 0x1b}], 0x4, &(0x7f0000002ac0)=""/170, 0xaa}, 0x6}, {{&(0x7f0000002b80)=@vsock, 0x80, &(0x7f0000003f80)=[{&(0x7f0000002c00)=""/203, 0xcb}, {&(0x7f0000002d00)=""/122, 0x7a}, {&(0x7f0000002d80)=""/1, 0x1}, {&(0x7f0000002dc0)=""/135, 0x87}, {&(0x7f0000002e80)=""/141, 0x8d}, {&(0x7f0000002f40)=""/4096, 0x1000}, {&(0x7f0000003f40)=""/32, 0x20}], 0x7, &(0x7f0000004000)=""/112, 0x70}, 0xfffffffffffffffb}, {{&(0x7f0000004080)=@alg, 0x80, &(0x7f00000043c0)=[{&(0x7f0000004100)=""/248, 0xf8}, {&(0x7f0000004200)=""/85, 0x55}, {&(0x7f0000004280)=""/218, 0xda}, {&(0x7f0000004380)=""/20, 0x14}], 0x4}, 0x8000}, {{&(0x7f0000004400)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000046c0)=[{&(0x7f0000004480)=""/221, 0xdd}, {&(0x7f0000004580)=""/1, 0x1}, {&(0x7f00000045c0)=""/242, 0xf2}], 0x3, &(0x7f0000004700)=""/130, 0x82}, 0xff}, {{&(0x7f00000047c0)=@isdn, 0x80, &(0x7f0000005a40)=[{&(0x7f0000004840)=""/16, 0x10}, {&(0x7f0000004880)=""/114, 0x72}, {&(0x7f0000004900)=""/4096, 0x1000}, {&(0x7f0000005900)=""/173, 0xad}, {&(0x7f00000059c0)=""/87, 0x57}], 0x5, &(0x7f0000005ac0)=""/248, 0xf8}, 0xec9}], 0x7, 0x2120, &(0x7f0000005d80)={0x77359400}) 12:06:58 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000000)) 12:06:58 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x509902, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)) syslog(0x40000002, &(0x7f0000000940)=""/193, 0xc1) 12:06:58 executing program 3: r0 = socket$inet6(0xa, 0x2000000801, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r2 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000180)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000484e53d8000000000000000000000000000000000000004fcd77553a59f23371ccc7207eaa665c00000000000094a26e2bc0000000000000000000000000000000000000000000000000000000190000000000000000000000000001010000000000000000000000000000000000"], 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000000c0)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x800, 0x2}, 0x20) 12:06:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x24, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) r2 = syz_open_procfs(r1, &(0x7f0000000200)='maps\x00') preadv(r2, &(0x7f0000000100), 0x2df, 0x0) 12:06:58 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0xfcfdffff00000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:58 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0xc400, 0x0) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000280)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xc, 0xfffffffffffffffe, 0x1, 0x0, 0x0, 0x80}, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f0000000080)={{r1, r2+10000000}, {0x77359400}}, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000200)={0x8000, 0x3, 0x4}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x1, 0x2, 0x10000, 0x0, 0x8}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140)={r3, 0x8d}, &(0x7f0000000180)=0xc) [ 804.990986] hfs: unable to load codepage "none" [ 804.995715] hfs: unable to parse mount options 12:06:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000100), 0x0, 0x20000007, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0xfffffffffffffffc}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='vegas\x00', 0x6) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r2, 0x540e, 0x6) r3 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x101000) ioctl$SG_SET_COMMAND_Q(r3, 0x2271, &(0x7f0000000080)) r4 = socket$inet(0x10, 0x3, 0x4) sendmsg(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a6008000004e22000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) 12:06:59 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) syz_mount_image$ceph(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x6, &(0x7f0000000340)=[{&(0x7f0000000080)="86cba517ea1344a55a2ab420279d3b20c121840aa57631ee52dba6dcdc90fced1840ffa8d60d58a6577be7249f6548d44fd31206304964aa6245b2b614e19a3ddeefd6881977700defa2de1fe73616d38a", 0x51, 0x80000000}, {&(0x7f0000000100)="0d531b0bf578a4f9f342d54bb7d92279b33caed4afba07e873ca5d1a7834a77252cd925e16a12c306612c69277b3546622a02868ad462c2d8180cd7fcee40652e3f9d04f69c29970e6f2aee5fdf5e8ce3c75e6326fe0a879a35ae6b61ac95a37a9e4c10468a44a81464fc4a082b885153705e74af7d361b30479cad484d94b8d0e03a16231233ce11402d8b69b3fc90857e4c5dec74b0b921932c8bef8b3b270db1391c4", 0xa4, 0x10000}, {&(0x7f00000001c0)="952bd46babd6ca0cb3f1a33e4263652aeaa84d255de94d4a1cb0b18c9eb5e7673bce44952d39f8df1e6b8af2894f76f7902b5e009532479217032e11674ffc4419bdec27a42d73f26b58839ba433f8cca5ca3abe498e2a6fb77c5597", 0x5c, 0x8}, {&(0x7f0000000240)="2bbed5a9e5acaa950713a1700a280798ebfa0549a2768e8d92e1444612d50cfd1772a7a7342be29390eb31ae138e3d89681532f0238a22152f06", 0x3a, 0x54e748c0}, {&(0x7f0000000280)="c9a4ce1dc84c88b60e43084153401604e08e9467fa22f0c2132965f41a7343c34f363ea3c75464e75b05e64564ea0c531552a5e3cd864a02353de91d461fe89fc5ba9b788a7e1643cb35fa1d4851f182e398d734b982db591b7df418d9a0627baad6067dbc657267134ca5", 0x6b, 0x3}, {&(0x7f0000000300), 0x0, 0xe759b10}], 0x0, &(0x7f0000000400)='ppp1trusted-md5sum$+em0selfnodev,\x00') 12:06:59 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:59 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0xa002, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200}, 0x3, &(0x7f0000000340)={&(0x7f00000003c0)={0x60, r1, 0x600, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x40, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x93}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ab8000000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7a4a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}]}, @TIPC_NLA_BEARER={0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0x0, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x0, 0x4, {{0x0, 0x1, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x0, 0x2, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}, @TIPC_NLA_BEARER_NAME={0x0, 0x1, @udp='udp:syz0\x00'}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x2000c041}, 0x4000) bpf$PROG_LOAD(0x5, &(0x7f00000089c0)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffa5, 0x0, 0x20001}, [@ldst={0x7, 0x18d1fb, 0x0, 0x1d1, 0xa}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x9d84, 0x3e9, &(0x7f0000000140)=""/195, 0x0, 0x0, [0x1b515f]}, 0x48) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) [ 805.108365] hfs: unable to load codepage "none" [ 805.113083] hfs: unable to parse mount options [ 805.171975] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:06:59 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0xb0, 0x0, 0x0, &(0x7f0000001b80)={[{@creator={'creator', 0x3d, "48d0d5d5"}}]}) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000000)) [ 805.285050] Unknown ioctl 19249 12:06:59 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x20080, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000180)={0xaa, 0x1}) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000080)="3a17084fd196feecaa3ede20fa1661a3efbd8b604e1df249a093c32aa9f1741abeb42b5441e4121ab81caa63a1bc02311ba9504b48c3ae3ae24bbf3b1336fc8f4cdcd3b8816510c39711f3130462d987f744ef27efd10bc9015fc5149a246a857b32877889e5ef809d506a5acc173bc228866dcd97538043d425b14c552f088820e2ee9689aa3836a18e266f7b0b2b9a716f047bc0d22b5d3b321a709da4b45227d8d9de0806c62c1c55425de82aed2984abe50aed8bf09204aeae3c5837c000d0ca2aebbf9719c715f36aa4994068e165c6853ea01df1d291faf6bedfca2ae081aafbc3b770f3f7f4665273dec4bf64d9aea6f66292b71b7540feebe3624774") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f00000001c0)='\x00', 0xdb, 0x0, &(0x7f00000002c0), 0x2000000, &(0x7f0000000300)={[{@nojoliet='nojoliet'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'procvboxnet1keyring{\x95$'}}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x35, 0x66, 0x38, 0x36, 0x7f, 0x64], 0x2d, [0x61, 0x77, 0x32, 0x37], 0x2d, [0x66, 0x76, 0x64, 0x31], 0x2d, [0x7f, 0x32, 0x7d, 0x61], 0x2d, [0x38, 0x3a, 0x7b, 0x33, 0x31, 0x75, 0x35, 0x37]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'vboxnet1'}}]}) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000200)={'ipvs\x00'}, &(0x7f0000000240)=0x1e) 12:06:59 executing program 2: getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)=0x0) sched_setaffinity(r0, 0x39a, 0x0) r1 = accept$netrom(0xffffffffffffff9c, &(0x7f0000000180)={{}, [@rose, @rose, @default, @default, @default, @netrom, @bcast]}, &(0x7f0000000200)=0x48) bind$netrom(r1, &(0x7f0000000240)={{0x3, @null, 0x6}, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0xffffffffffff8000, 0x109000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x401, 0x28240) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={0xfffffffffffffffe}, 0x1, 0x0, 0x0, 0x40000}, 0x8090) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$BLKPBSZGET(r3, 0x127b, &(0x7f0000000040)) 12:06:59 executing program 4: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000140)={0x9, 0x201, 0x7, 0x5a62, 0x0}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000002c0)={r1, 0x10001}, 0xc) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x3a, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7cf, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = accept(0xffffffffffffff9c, &(0x7f0000000000)=@rc, &(0x7f00000000c0)=0x80) setsockopt$TIPC_IMPORTANCE(r2, 0x10f, 0x7f, &(0x7f0000000100)=0x6, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r3, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x0, 0x0, @fd}]}]}, 0x24c}}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r4, &(0x7f0000000080)=0x3, 0x297ef) 12:06:59 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0xfdffffff00000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 805.386424] Unknown ioctl 19249 12:06:59 executing program 5: prctl$PR_GET_DUMPABLE(0x3) syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:59 executing program 3: socketpair$unix(0x1, 0x100000000005, 0x0, &(0x7f00000002c0)) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x10001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400201) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000080)=0xd1e, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x11, 0x4, 0x4000000004, 0xffff, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0xa]}, 0x2c) 12:06:59 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) signalfd4(r0, &(0x7f0000000000)={0x8}, 0x8, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:59 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0xffffff7f00000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:59 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, r0, 0x0) read(r1, &(0x7f00000000c0)=""/91, 0x5b) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x8000, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000140)=""/188, &(0x7f0000000080)=0xbc) 12:06:59 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x7fffffff) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 805.633546] hfs: unable to load codepage "none" [ 805.639018] hfs: unable to parse mount options 12:06:59 executing program 3: socketpair$unix(0x1, 0x100000000005, 0x0, &(0x7f00000002c0)) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x10001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400201) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000080)=0xd1e, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x11, 0x4, 0x4000000004, 0xffff, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0xa]}, 0x2c) 12:06:59 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/fscreate\x00') accept4$ax25(r0, &(0x7f0000000040)={{}, [@null, @bcast, @default, @null, @bcast, @default, @default, @default]}, &(0x7f00000000c0)=0x48, 0x80800) 12:06:59 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:06:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4(r0, &(0x7f0000000140)=@alg, &(0x7f00000000c0)=0x80, 0x80000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f00000001c0)={0x9, 0x7f, 0x2, 0xfffffffffffffc01, 0x5, 0x5053c335, 0x101, 0x6, 0x0}, &(0x7f0000000200)=0x20) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000240)={r3, 0x5}, 0x8) setsockopt$sock_int(r0, 0x1, 0x800000000010, &(0x7f0000000100)=0x415, 0x4) sendmmsg(r1, &(0x7f000000d8c0), 0xff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000000)={'veth1_to_bond\x00', {0x2, 0x4e24, @empty}}) 12:06:59 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5460, &(0x7f0000000000)) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:06:59 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 805.981839] hfs: unable to load codepage "none" [ 805.994260] hfs: unable to parse mount options 12:07:00 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000100)='./file0/file0\x00', 0x181) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 12:07:00 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) listen(r0, 0x80000001) syz_open_dev$vivid(&(0x7f0000000040)='/dev/video#\x00', 0x1, 0x2) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x1, 0x0) ioctl$UDMABUF_CREATE(r1, 0x40187542, &(0x7f0000000000)={r1, 0x1, 0x14000, 0xfffffffff0001000}) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000100)=0x20000001) 12:07:00 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) r0 = fcntl$getown(0xffffffffffffff9c, 0x9) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000100)=0x8000, 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685) r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x100, 0x80) msync(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2) getsockopt$netrom_NETROM_T1(r3, 0x103, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) syslog(0x2, &(0x7f0000000200)=""/193, 0x2943accfa63bc9b2) [ 806.129811] hfs: unable to load codepage "none" [ 806.134518] hfs: unable to parse mount options 12:07:00 executing program 5: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000040)='./file0\x00', 0x92, 0x4, &(0x7f0000000380)=[{&(0x7f0000000080)="57facd9d921e6cb591e881fe19f3b5fc23ba315b55741cb7241dc55a6b5df91019f8a4d02cbf9f77a04a528b7ee5967f63e5411f48ea88d823a77a08e3a965f8a5173dea6e8507985f74d2", 0x4b, 0xfffffffffffffffa}, {&(0x7f0000000100)="dfbee99f0cf79466304e8501df705d35c9d5825daf756dd22c4632195cd14ce277c76462f21accd3b9acae58b1938f2effc313e01d1a5a473e64915ac5a985643d37b6f7ee88aa666948d008d5ece2cf83bd910924a3e220e8d92f084ed13dea6d64f6c9fde2d2e8c7c397b6df87c83c119440f75c360a49d29842a3730e4298177c024d125691a769cb39a06296863738a9e6fe0233f39f60edb8eed8be6874ad29f4f6bbe0a1144cdd697b7c9274538679fa79fb04e7abcd66c786b62d199f1ad7546b5495c4ce16c9b631d91b", 0xce, 0x4c354494}, {&(0x7f0000000200)="016c72f737ef02d35631983afd9557c63bf0f4533209d5d0c5e7f54dd041392d9baf2724e8d1252daed4b6c63303391e095b4e037e221665a76d53bad3f7068100a0b90a59f759fa1c36bacbd639db3cf693470bae798bf606bb1106f6cf6958285cbe", 0x63, 0x4}, {&(0x7f0000000280)="165dfe20398d33f2e717b1c54f3f9bb31a687c3edbb314d22e90193ffa1220557629bfd220c73354a9c6f6c7f73b88e831fa6d8e01288d4b52b9e561d4a7f39c866a70a7af9ec98c471740853395975b3968930a5d495bc3c9baf66502c326c278919a6aee972bc30baa0b799a0d67d95a832bb7e378b2d75dbbacbbf273cf4acf4e0261d11c9820a6acb64d0c86ca388471fe00e430487e6e583d1ff018567086d9155c4c8291fde7ba7487e121d03831dfec76c695e99a27bada4e3d4225bbc60ab7d3d2cc50f1fa7f1eb66eb84b1a8947", 0xd2, 0x1}], 0x820003, 0x0) syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="636f6465706167653d6e6f6e652c00ec7fa50e283ac003fce26f293815b29eee4f08d0947e05eb9792fe670008000012d93fbe"]) lsetxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) 12:07:00 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg(r1, &(0x7f00000016c0)={&(0x7f00000002c0)=@can, 0x80, &(0x7f0000001580)=[{&(0x7f0000000080)=""/10, 0xa}], 0x1, &(0x7f0000001600)=""/165, 0x149}, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000000180)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/61, 0x3d}, {&(0x7f0000000200)=""/70, 0x46}, {&(0x7f0000000340)=""/177, 0xb1}], 0x3, &(0x7f0000000400)=""/252, 0xfc}, 0x40000000) close(r1) close(r0) 12:07:00 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x2, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:07:00 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) r0 = getpgid(0xffffffffffffffff) getpgid(0x0) r1 = getpgrp(r0) sched_setaffinity(r1, 0xfffffffffffffc9e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/ip_tables_matches\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200)={0xffffffffffffffff}, 0x2, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000280)={0x7, 0x8, 0xfa00, {r3, 0xfffffffffffffffb}}, 0x10) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x64) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r4, 0x800442d4, &(0x7f0000000180)=0x8) syslog(0x0, &(0x7f0000000040)=""/193, 0x3e6) 12:07:00 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) r0 = fcntl$getown(0xffffffffffffff9c, 0x9) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000100)=0x8000, 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685) r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x100, 0x80) msync(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2) getsockopt$netrom_NETROM_T1(r3, 0x103, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) syslog(0x2, &(0x7f0000000200)=""/193, 0x2943accfa63bc9b2) [ 806.475190] hfs: unable to load codepage "none" 12:07:00 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x80) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 806.507616] hfs: unable to parse mount options 12:07:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x4000, 0x0) write$P9_RMKDIR(r0, &(0x7f0000000180)={0x14, 0x49, 0x2, {0x40, 0x0, 0x6}}, 0x14) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) getsockopt(r0, 0x400, 0x20, &(0x7f0000000400)=""/255, &(0x7f0000000340)=0xff) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xad85, 0x601) epoll_pwait(r2, &(0x7f00000000c0)=[{}], 0x1, 0x3, &(0x7f0000000100)={0x7}, 0x8) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) sendmsg$rds(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x58}, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x80000000064, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) execve(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) 12:07:00 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x10140, 0x80) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000040)=""/231) syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:07:00 executing program 2: r0 = getpgrp(0xffffffffffffffff) sched_setaffinity(r0, 0x132, 0x0) r1 = shmget$private(0x0, 0x2000, 0x2, &(0x7f0000ffb000/0x2000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000000)={{{@in6=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f0000000100)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) geteuid() fstat(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000300)={{0x100000000, r2, r3, r4, r5, 0x6, 0x2}, 0xffffffff00000000, 0x1000, 0x3, 0x1, r0, r0, 0x80}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:07:00 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x3, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:07:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(0xffffffffffffffff, 0xc0485661, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x0) socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x80}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000100)={r3, 0x9}, &(0x7f0000000140)=0x8) socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f000000d379)={&(0x7f0000000200)=ANY=[]}, 0x1, 0x0, 0x0, 0x2000000000000000}, 0x0) r4 = add_key(&(0x7f0000000180)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)="951c88f91d91f7a187206ef7ea51c8cbe1c419826c82a9887721b5e89eb3621982b27852c6580f305f219ea3ff708ddb7a6fc98cac47ba68b3ee07c51dc8ee87a62feb4728a8fa462fa246c95954e8269d507b7fa6d69daf7ec1c07673a0182880288a407e043dff2a0028918fc1a7bb72d4ba", 0x73, 0xffffffffffffffff) keyctl$setperm(0x5, r4, 0x4023010) 12:07:00 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000017, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r2 = syz_open_pts(r0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='autogroup\x00') write$P9_RLCREATE(r3, &(0x7f00000000c0)={0x18, 0xf, 0x1, {{0x0, 0x2, 0x7}, 0x20}}, 0x18) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000fd0ffc)=0x14) ioctl$TCSETSF(r2, 0x5423, &(0x7f0000000000)) 12:07:00 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='devtmpfs\x00', 0x10001, &(0x7f00000000c0)='-mime_type\x00') process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 806.805587] hfs: unable to load codepage "none" [ 806.819894] hfs: unable to parse mount options [ 806.888919] hfs: unable to load codepage "none" [ 806.893806] hfs: unable to parse mount options 12:07:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="08fb26a66f2c00"]) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) [ 806.973268] hfs: unable to load codepage "none" [ 806.980344] hfs: unable to parse mount options [ 807.000786] hfs: unable to load codepage "none" [ 807.009040] hfs: unable to parse mount options 12:07:01 executing program 2: r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@can, &(0x7f0000000080)=0x80) sched_setaffinity(0x0, 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x8, 0x400) ioctl$TCSBRK(r1, 0x5409, 0x29041725) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r2) r3 = dup2(r2, r0) write$UHID_GET_REPORT_REPLY(r3, &(0x7f0000000100)={0xa, 0x2, 0xff80000000000000, 0x5}, 0xa) mq_timedsend(r3, &(0x7f0000000180)="a016c61837d8a03c491abea13a27d1fdcdc74f9791d02e529b216d07db05cf17137c0c56cfd27b3d87c13286", 0x2c, 0x8000, &(0x7f00000001c0)) write$P9_RSTAT(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="4e19b9e4d8010000004700cf00020000000a04000000080000000000000000000020db56aa8f6500000000f0ffffffffffff01002801002712002f6465762f736e642f70636d43234423630000007b98d1735d2a3a943d051f2957bf2b1dd223ace11efdf953481e76701a4f07403e7f15343919079295a2040cd8f54b197ea70486f9bd03faae1c163fbdaf266f0f7f2f0869092effc2750afbad4e0a568728065296820dfed859b8b2b00a128b46eab73975d604"], 0x4e) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) recvfrom$unix(r1, &(0x7f0000000280)=""/172, 0xac, 0x0, 0x0, 0x0) 12:07:01 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:07:01 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:07:01 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="636f6465706167653d6e6f6e652c003412dde7f5e6fe0331d73c55147fa60f68b7e484e9cc86b3c6a606584c346a5e3b93b4ee4f658988174adb03a56ab06ae8e104de74589aff5573baccb4bc3a3b7fd6a622e8340a15c7f4128101c2a3fe"]) [ 807.248281] 9pnet: Insufficient options for proto=fd 12:07:01 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x1, 0x2) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000180)=0x2, 0x4) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}}, 0xffffffffffffffff, 0x40000000000000, 0xffffffffffffffff, 0x8) mmap(&(0x7f00001bd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ppoll(&(0x7f0000000080)=[{r1}], 0x1, 0x0, 0x0, 0xfffffffffffffd00) mmap(&(0x7f00001bd000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) 12:07:01 executing program 3: mkdir(&(0x7f0000001040)='./file0\x00', 0x0) mount(&(0x7f0000900ff8), &(0x7f000001c000)='./file0\x00', &(0x7f0000982ff9)='mqueue\x00', 0x0, &(0x7f0000ebcffe)) r0 = creat(&(0x7f0000c5eff4)='./file0/bus\x00', 0x0) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) mq_timedsend(r0, &(0x7f0000000000)="f6", 0x1, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, r1) 12:07:01 executing program 1: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) timer_create(0x7, &(0x7f00000000c0)={0x0, 0x22, 0x6}, &(0x7f0000000100)=0x0) timer_settime(r0, 0x0, &(0x7f0000000140)={{0x77359400}, {0x77359400}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0x5, 0x9]) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000180)=""/193, 0xfd84) [ 807.483154] hfs: unable to load codepage "none" [ 807.488133] hfs: unable to parse mount options [ 807.562432] hfs: unable to load codepage "none" [ 807.567456] hfs: unable to parse mount options 12:07:01 executing program 2: sched_setaffinity(0x0, 0xd1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000100)=""/193, 0x414) [ 807.679781] hfs: unable to load codepage "none" [ 807.687599] hfs: unable to parse mount options 12:07:01 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x5, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:07:01 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x1b) prctl$PR_GET_SECCOMP(0x15) [ 807.798312] hfs: unable to load codepage "none" [ 807.803063] hfs: unable to parse mount options 12:07:01 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:07:01 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)={0x0, 0x0}) sched_getattr(r0, &(0x7f0000000080), 0x30, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) [ 808.148956] hfs: unable to load codepage "none" [ 808.153921] hfs: unable to parse mount options 12:07:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={0x0, 0xcd}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000000c0)={r1, 0x6}, &(0x7f0000000100)=0xc) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xe, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x6800}]}, &(0x7f0000000240)='GPL\x00', 0x2, 0x2e6, &(0x7f00001a7f05)=""/251}, 0x48) 12:07:02 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r1 = dup3(r0, r0, 0x80000) ioctl$VIDIOC_ENUMAUDIO(r1, 0xc0345641, &(0x7f0000000000)={0x9, "061343cf065be677c6a30435ea5ee507da39908b874f4f95c9894e921a96d0ac", 0x2, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x9, &(0x7f0000000200)=""/193, 0xc1) [ 808.265694] hfs: unable to load codepage "none" [ 808.296520] hfs: unable to parse mount options [ 808.356203] hfs: unable to load codepage "none" [ 808.361194] hfs: unable to parse mount options 12:07:02 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x6, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 808.498417] hfs: unable to load codepage "none" 12:07:02 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f000000b000)={&(0x7f000000f000), 0xc, &(0x7f00005a6ff0)={&(0x7f0000451ccc)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6}, {@in=@loopback, 0x0, 0x6c}, @in6=@loopback, {}, {}, {}, 0x0, 0x0, 0x2, 0x4}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}}, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x689eb116, 0x20}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={r2, 0x4}, &(0x7f0000000100)=0x8) socket$inet6_udplite(0xa, 0x2, 0x88) 12:07:02 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) write$binfmt_elf64(r0, &(0x7f0000000f80)=ANY=[@ANYBLOB="7f454c4602000000000000000000000003000000000000000000000000e1038fe8753007e900000000000000000000000000000000003800000000000000000002000070d7000000c1000000000000008000000000000000090000000000000001000000000000000002000000000000cc000000000000002f06e1b1ac2e048234f77cc87a7a079c5e67d7e43ee4bae4fbb62bb54a91579dfa41153c53f57fd2505b1a02de7214227db511d5d1163cf328d3f46ec3d219bfca1b2e2fbaa34afa627095ad41f52a4ddc8e7fbb124ee881430e3e48e8eb707300e66d016f93729f7e28af230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x3f5) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0x80) sendto(r0, &(0x7f0000000880)="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", 0x2d9, 0x1, 0x0, 0x0) [ 808.595012] hfs: unable to parse mount options 12:07:02 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000040)=0x2) prctl$PR_GET_SECUREBITS(0x1b) 12:07:02 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3f, 0xc00) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000040)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) fcntl$getownex(r0, 0x10, &(0x7f00000005c0)={0x0, 0x0}) getresuid(&(0x7f0000000600)=0x0, &(0x7f0000000640), &(0x7f0000000680)) getgroups(0x2, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff]) r6 = fcntl$getown(r0, 0x9) r7 = geteuid() fstat(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000b40)=0xe8) getgroups(0x4, &(0x7f0000000b80)=[0xee01, 0x0, 0xee00, 0xee01]) sendmmsg$unix(r1, &(0x7f0000000cc0)=[{&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000100)="28768d4e22a3a3bf370a9c8c5e77241adcd69f828b5a5a73b64e4fe5530e940fe750209b7b410e245a4ab5a550f82a1b5d85b3ab20145c46ac1354eca16942319954", 0x42}, {&(0x7f0000000180)="ea29c1def2e256dbfc28348a23bfa599220c35e50fca30723f5b8a018e31616917f26c837c5d98866f1dd3fe77f56634d381e0dd79c673875bd1a3129b5682ba37f7b96b962286ac40edf59cb5603f6a346a2946e6a069fe5df58241280b33461fe8a9b3d4d8be21f7bfcf767b870f47971e60337ca28855fe1da7a6456ef1f479e24475cd8c2390b5e922b4b7cb535f8e018638d3a387780387c1d31b178e7db101fc6fcb01a2f0faf644df4abe079f2912e8220906b6e9ede3273f8a471e59a0917aff1d8181729bb449cacee32c13ab15b8e432f90f8a42aee05951b5bf52d057d250c2565e", 0xe7}, {&(0x7f0000000280)="400db3a31e03040a5e7ae028a5036c6287c8d95b59a16516bde8dcf131be", 0x1e}, {&(0x7f00000002c0)="70241c68f90b077979c185ac007708a4a50e5d81a94f285958ab558cc6e59dbb8fd4c7575ecfa1bc826ce033ec324131182f0e08a1db223c5497054f0db125697d69fe506b6afe04837bf4409ce1b8c93d7762e35f14af16d5eb0df095ec283a67d4d94d2321ca8ab2111cd21d74eede6b00f92d4a4a2de66c7ee57330affa24701c52312ce9298424946adf847352b7b1f0f727739cf4f62a8017e5062ef83fd63428e41322d7718676de4472f755ddbca5eec33d", 0xb5}], 0x4, &(0x7f00000003c0)=[@rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r1, r2]}], 0x28, 0x20000000}, {&(0x7f0000000400)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000580)=[{&(0x7f00000004c0)='&U', 0x2}, {&(0x7f0000000500)="c269a296bfafc15ce887e87ef64c5f9f3dedb0ddd04cb9e801a21c5da3e0e1eb0c297d025c95f25ff01b6debfe01f32cfd733f0b9ccb3f84164de3232492e47b4591e9db03c3dfa7a891a99b5af4850bb06f42996df4fb073712302c164e9fb7cbdb2e1dfd21cf50a984a7b850e3bfbec5d2e63b94", 0x75}], 0x2, &(0x7f0000000700)=[@cred={0x20, 0x1, 0x2, r3, r4, r5}], 0x20, 0x24004040}, {&(0x7f0000000740)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000880)=[{&(0x7f00000007c0)="1a161f7169ee6c122f625cdec53adccaea1643fbb03968e2686f03fbcb8b455e34003b31c6cc5943b5355a5ceaba74938598955f17e3782cfb080e93b8ab30b36644b3fb8cc992", 0x47}, {&(0x7f0000000840)="1ff047dcc33b478406ae1782328c51e7", 0x10}], 0x2, &(0x7f0000000bc0)=[@cred={0x20, 0x1, 0x2, r6, r7, r8}, @cred={0x20, 0x1, 0x2, r9, r10, r11}, @rights={0x28, 0x1, 0x1, [r1, r1, r2, r1, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @rights={0x20, 0x1, 0x1, [r2, r2, r2, r0]}, @rights={0x20, 0x1, 0x1, [r1, r2, r1, r2]}], 0xc8, 0x20000804}], 0x3, 0x4000) 12:07:02 executing program 5: r0 = accept(0xffffffffffffff9c, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80) ioctl$SIOCAX25NOUID(r0, 0x89e3, &(0x7f00000000c0)=0x1) syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 808.789953] hfs: unable to load codepage "none" [ 808.798420] hfs: unable to parse mount options 12:07:02 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040), 0x0) [ 808.965260] hfs: unable to load codepage "none" [ 808.982598] hfs: unable to parse mount options 12:07:03 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x5, &(0x7f0000000440)=""/193, 0x28) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm-monitor\x00', 0x40000, 0x0) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000000600)={[], 0x0, 0x8, 0x800, 0x0, 0x73cd60f1, 0x100000, 0xd000, [], 0x5}) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1ff, 0xc1) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, r0, 0x0, 0x1, &(0x7f00000003c0)='\x00', 0xffffffffffffffff}, 0x30) ptrace$setopts(0x4206, r4, 0xffff, 0x4) sendmsg$TIPC_NL_MEDIA_SET(r2, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40200}, 0xc, &(0x7f0000000340)={&(0x7f00000000c0)=ANY=[@ANYBLOB="68bfbdf1", @ANYRES16=r3, @ANYBLOB="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"], 0x278}, 0x1, 0x0, 0x0, 0x4004040}, 0x4000000) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000580)) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000540)=0x8001) 12:07:03 executing program 4: r0 = accept4$rose(0xffffffffffffffff, &(0x7f0000000040)=@short={0xb, @remote, @bcast}, &(0x7f0000000140)=0x1c, 0x80800) r1 = accept4(r0, &(0x7f0000000180)=@rc, &(0x7f0000000200)=0x80, 0x800) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000280)={0x77, 0x0, [0x17b, 0x0, 0x3]}) r3 = gettid() fcntl$notify(r0, 0x402, 0x1) ptrace$setopts(0x4206, r3, 0x57c5e653, 0x4) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4e23, 0xfff, @mcast1}}}, &(0x7f00000000c0)=0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={0x0, 0x4}, &(0x7f0000000500)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000540)={r4, 0xfffffffffffffda1, "3d583627df84b36e88d3dff2d0c031c655af234d118b143562b70e32462e069d6fcd1edd04520c0cf871f488e68c6f5280f7fb92159ee18744c8c1e2b92f6c4b2334e5504c42636ee1569fc10188c4ebe35b429d9c7f97c77246e1023a3b57a31a1b4ef29f9ad09cd0daa27fb829212d95649bc6b0e0c5fbea7294a00cc7bdc9025bb70f71b1fdda657e67a0066c4d1889baf4fa0d34f6f2925eee148d51616c73d4c06c81b8ee8a7178afa85709c3bcb61b8d0ddc29b27c3475e56c2f31acad13f2814a4b7ab332e51a8c00b19abe3ebf51caf15f9893"}, &(0x7f0000000240)=0xdf) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) ioctl$IMDELTIMER(r6, 0x80044941, &(0x7f0000000340)=0x2) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000400)=@assoc_value={r5, 0x715}, 0x8) 12:07:03 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x7, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 809.185346] hfs: unable to load codepage "none" [ 809.190672] hfs: unable to parse mount options 12:07:03 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:07:03 executing program 3: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) mlockall(0x1) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) lseek(r0, 0x0, 0x4) [ 809.336060] hfs: unable to load codepage "none" [ 809.367535] hfs: unable to parse mount options 12:07:03 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) r1 = dup3(r0, r0, 0x80000) ioctl$VIDIOC_G_OUTPUT(r1, 0x8004562e, &(0x7f0000000080)) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x2, 0x600) write$FUSE_NOTIFY_STORE(r1, &(0x7f00000000c0)={0x2d, 0x4, 0x0, {0x0, 0x5, 0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2d) bind$isdn(r2, &(0x7f0000000040)={0x22, 0xdee, 0x400000000000080, 0x4, 0x9}, 0x6) [ 809.459218] hfs: unable to load codepage "none" [ 809.464135] hfs: unable to parse mount options 12:07:03 executing program 4: r0 = timerfd_create(0x0, 0x0) ioctl$int_out(r0, 0x0, &(0x7f0000000040)) timerfd_gettime(r0, &(0x7f0000000000)) 12:07:03 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, &(0x7f0000000040), 0x1) syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f00000001c0)={0x72, {{0xa, 0x4e20, 0x81, @rand_addr="f5930a02636fcaf1200b96484924074f", 0x3}}, 0x0, 0x7, [{{0xa, 0x4e24, 0x0, @mcast2, 0x7f}}, {{0xa, 0x4e21, 0x8000, @remote, 0x7}}, {{0xa, 0x4e23, 0x4, @empty, 0xb8d0}}, {{0xa, 0x4e24, 0x4, @dev={0xfe, 0x80, [], 0x12}, 0x800}}, {{0xa, 0x4e21, 0xa540, @loopback, 0x5}}, {{0xa, 0x4e22, 0x3f, @remote, 0xbc64}}, {{0xa, 0x4e20, 0x800, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x27}}, 0x10000}}]}, 0x410) [ 809.501774] audit: type=1804 audit(1547813223.457:78): pid=5367 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir227258966/syzkaller.nOMPDs/1121/bus" dev="sda1" ino=17460 res=1 12:07:03 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40001, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 809.626207] hfs: unable to load codepage "none" [ 809.643539] hfs: unable to parse mount options 12:07:03 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) r0 = gettid() r1 = request_key(&(0x7f0000000100)='.request_key_auth\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)='cgroupwlan0lobdevselinuxwlan1/ppp1$}lo\x00', 0xfffffffffffffff8) request_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='+*\x00', r1) sched_getparam(r0, &(0x7f0000000000)) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:07:03 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0xa, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:07:03 executing program 4: syz_mount_image$jfs(&(0x7f0000002400)='jfs\x00', &(0x7f0000002940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x800) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, {0x2, 0x9ec, 0x100, 0x1}}) 12:07:03 executing program 1: sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x400000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(md5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000c80), 0xdf1fd48b9a0b66, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x401, 0xa000) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000180)=0x400, 0x4) syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000100)={0x0, 0x5, 0x6, 0x4}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$usbmon(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(0xffffffffffffffff, 0x80046402, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) getsockname$netrom(r3, &(0x7f0000000040)={{0x3, @netrom}, [@netrom, @null, @rose, @default, @remote, @default, @remote, @null]}, &(0x7f00000000c0)=0x48) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 809.963136] hfs: unable to load codepage "none" [ 809.969746] hfs: unable to parse mount options 12:07:03 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x40801, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f00000002c0)=[0x92, 0x3]) sched_setaffinity(0x0, 0x0, 0x0) write$P9_RWRITE(r0, &(0x7f0000000140)={0xb, 0x77, 0x2, 0x7ff}, 0xb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x117, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000240)={0x10, 0x30, 0xfa00, {&(0x7f0000000180), 0x4, {0xa, 0x4e22, 0x5, @loopback, 0x8a40}, r1}}, 0x38) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000080)={0x2, 0x8001, 0x0, 0x1}, 0x10) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0), 0x4) getpeername$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, &(0x7f0000000300)=0x1c) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000040)) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) bind$netlink(r0, &(0x7f0000000100)={0x10, 0x0, 0x25dfdbfd}, 0xc) [ 810.015765] hfs: unable to load codepage "none" [ 810.022947] hfs: unable to parse mount options 12:07:04 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40001, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 810.221926] hfs: unable to load codepage "none" [ 810.227374] hfs: unable to load codepage "none" [ 810.227808] hfs: unable to parse mount options [ 810.232071] hfs: unable to parse mount options 12:07:04 executing program 2: r0 = gettid() sched_setaffinity(r0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_GET_UNALIGN(0x5, &(0x7f00000001c0)) sched_setattr(r2, &(0x7f0000000200)={0x30, 0x7, 0x1, 0xffff, 0x5, 0x0, 0xc0, 0x5}, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000080)) openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0) sched_rr_get_interval(r2, &(0x7f0000000040)) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) r3 = accept(0xffffffffffffff9c, &(0x7f00000000c0)=@nfc, &(0x7f0000000140)=0x80) ioctl$SIOCRSACCEPT(r3, 0x89e3) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000240)=@assoc_value={0x0, 0x5}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f00000002c0)={r4, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x1, 0x5c63}, 0x90) [ 810.524984] audit: type=1804 audit(1547813224.478:79): pid=5367 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir227258966/syzkaller.nOMPDs/1121/bus" dev="sda1" ino=17460 res=1 [ 810.625664] audit: type=1804 audit(1547813224.588:80): pid=5372 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir227258966/syzkaller.nOMPDs/1121/bus" dev="sda1" ino=17460 res=1 12:07:04 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="636f6465706167653d6e6f6e652c00144a779bd492a268f2bf01d27060ac858c51c50c666fa326a257ea31e221b703d99a71d1bb94f208e51981e09437e69f41f27d9a49b4ee65f6a8d0f4a40ccd47b101fd537b5e0248b65f684335ff000000000000007442697bc4230a5ece03e0b5ab5f04e8cdf0"]) 12:07:04 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:07:04 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x20003, 0x0) r2 = fcntl$getown(r0, 0x9) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x8, 0xfffffffffffffffd, 0x4, 0x401, 0xe0f0, r2}) socket$inet6_sctp(0xa, 0x1, 0x84) bind$nfc_llcp(r1, &(0x7f00000000c0)={0x27, 0x0, 0x0, 0x7, 0xfd, 0x758a2e6e, "9a2308be7732c3cd15edf37f0b44a5b9e2bc3d38f466d0d273d30f1ac117bd11c700713c3967fdc00bd3f80e86cd462eb1210000b4b8fb767ca661ba0d1cf1", 0x18}, 0x60) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:07:04 executing program 3: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) mlockall(0x1) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) lseek(r0, 0x0, 0x4) 12:07:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, &(0x7f0000000040), 0x1) syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f00000001c0)={0x72, {{0xa, 0x4e20, 0x81, @rand_addr="f5930a02636fcaf1200b96484924074f", 0x3}}, 0x0, 0x7, [{{0xa, 0x4e24, 0x0, @mcast2, 0x7f}}, {{0xa, 0x4e21, 0x8000, @remote, 0x7}}, {{0xa, 0x4e23, 0x4, @empty, 0xb8d0}}, {{0xa, 0x4e24, 0x4, @dev={0xfe, 0x80, [], 0x12}, 0x800}}, {{0xa, 0x4e21, 0xa540, @loopback, 0x5}}, {{0xa, 0x4e22, 0x3f, @remote, 0xbc64}}, {{0xa, 0x4e20, 0x800, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x27}}, 0x10000}}]}, 0x410) 12:07:04 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x10000, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x10) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)='\x18o\xac#\x04$+\xf7\x92\x86\x06+\xf3X)\'\r:O\x02\xb4)\x95I\xa4R\x9e\xa2E \x8c\xe1\xe0\xc4|\x0e\x1a&\xa2\x83\xcb\xfa\xfa\xc0\xa0\x19;Bj\xebqz\x95\xff\xb2D\x84\x95\xa0\x1f\x1c\x8e\x8dF\x04s\x8d\xbd\x17f\x925\x7fq\xcb\xaa\x94\xa2\x88+\xc7\xd6\xb8\x9b\x9eDO\x9e\xd7\xc6L\x95\xcc3$[\xb1\xb1[ \xf4\x1fP\xe9\xec!\x1arN\xc3;G\xf0dIc7V\xd0\x1f\xcat`\xd4\xb5O\xa1\xcam\xde/5\x06\xac:\x87\xcdz\xde\x00\x1c`;\xf2\x9e\x1cX\x13') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000300)={'veth0_to_team\x00', &(0x7f0000000200)=@ethtool_eee={0x45, 0x9, 0x6, 0x4, 0xfffffffffffffe00, 0x100000001, 0x3ff, 0x101, [0x1000, 0x1]}}) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000001c0)=0x1, 0x4) syslog(0x2, &(0x7f00000000c0)=""/193, 0xc1) [ 810.897983] audit: type=1804 audit(1547813224.858:81): pid=5448 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir227258966/syzkaller.nOMPDs/1122/bus" dev="sda1" ino=16801 res=1 [ 811.009049] hfs: unable to load codepage "none" [ 811.013936] hfs: unable to parse mount options [ 811.027045] hfs: unable to load codepage "none" [ 811.031878] hfs: unable to parse mount options 12:07:05 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x80, 0x0) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, &(0x7f0000000040)) syslog(0x2, &(0x7f0000000440)=""/193, 0xc1) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000007c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f00000009c0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000980)={&(0x7f0000000800)={0x144, r1, 0x0, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffff00000001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xf26}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x95}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100}]}, @TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x3c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x32f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x327800000000000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA={0x78, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xdf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x144}, 0x1, 0x0, 0x0, 0x4004090}, 0x4000004) write$UHID_CREATE(r0, &(0x7f0000000640)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000540)=""/251, 0xfb, 0x800, 0x7, 0x9, 0x101, 0xffffffffffff0000}, 0x120) 12:07:05 executing program 5: syz_mount_image$minix(&(0x7f0000000040)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="0513f2ee486ab1a6f04c95dddbf5ce941c1a2047", 0x14, 0x4}, {&(0x7f0000000100)="2e8293d75a0609280ce9409d52a18baf449359c87682121c102411d706bbf9cebcaca033490b88de3240a5ac42a8556aa81246055f2dde75ebee72aeda2eccb3c86d2c12899f18fc2b7b7a49eb3c674833bb1f251ce7c10c276b2f4ea4ae3c694bfcb2e4e45b013eb12b01e969aa4584cf4cd2f8d98148c50c1e418ec5ea1984b6d00c7b1f476843e02a11", 0x8b, 0x40}, {&(0x7f00000001c0)="27af52945b648728db7d8655d6609bcef4e917076453a10f10ea2c86b2715d87df6679c3b09c2f7feb27a951b671c01179cc62d16cae632a67a977898e7183f60cdfe3d7be367d2a4c2270bdd1f7da6408e2f6bc292cdfaab22a17844b909c211e850fa8ee02c3994487591dc8969cf313ae22315c4a4ddc5e5aac9883f4828284e37f511cbeded8765bb65609eb81ed49fb9e831619c9f00975a12ff90178f77055fdea00cf86fe3d03cb8f9bbfc04ef05d2484c8c0289593d6138d33a7548d024f124ba003e55b806a99df2e40dfdb", 0xd0, 0x8}, {&(0x7f00000002c0)="ec454193acb46bc6175d59d65d5f75a1228b0eac51718978967712d982496b93e7d26168abad23effb293391dfdfb5bcb420d243e98add060056b40018a0c1d42b4f7dd57086b98152d1cd8489d820e79317f603ae6747a9a63bcdcb706c8190d48cb86f5b53b4c43b6f7a141931d4f1989825ba197d5c9dde6b4f485e9ce140dcf84f03256830fcc331f8", 0x8b, 0x3de3}], 0x800, 0x0) syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) setrlimit(0x0, &(0x7f0000000000)={0x9, 0x1}) [ 811.200244] hfs: unable to load codepage "none" [ 811.212096] hfs: unable to parse mount options [ 811.260807] hfs: unable to load codepage "none" 12:07:05 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = socket$inet(0x2, 0x8000b, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0xe, &(0x7f0000000080)=""/193, 0xc1) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000000)={{0x0, @broadcast, 0x4e24, 0x0, 'wlc\x00', 0x2, 0x40, 0x5b}, {@local, 0x4e21, 0x2, 0x7fffffff, 0x9}}, 0x44) [ 811.285133] hfs: unable to parse mount options 12:07:05 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x48, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 811.369812] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. 12:07:05 executing program 2: sched_setaffinity(0x0, 0xfffffffffffffdbb, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x28c901, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@empty, @in6=@empty, 0x4e24, 0x3f, 0x4e23, 0x1, 0x2, 0x20, 0xa0, 0x3a, r2, r3}, {0x9, 0x5, 0x6, 0x1b, 0x9, 0x6, 0x17aa, 0xa3a}, {0x7ff, 0x3f, 0x7}, 0xc6a, 0x6e6bb3, 0x2, 0x1, 0x2, 0x2}, {{@in=@rand_addr=0x6, 0x4d6}, 0x2, @in=@empty, 0x0, 0x7, 0x3, 0x11e9, 0x2, 0x75, 0x3}}, 0xe8) 12:07:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, &(0x7f0000000040), 0x1) syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f00000001c0)={0x72, {{0xa, 0x4e20, 0x81, @rand_addr="f5930a02636fcaf1200b96484924074f", 0x3}}, 0x0, 0x7, [{{0xa, 0x4e24, 0x0, @mcast2, 0x7f}}, {{0xa, 0x4e21, 0x8000, @remote, 0x7}}, {{0xa, 0x4e23, 0x4, @empty, 0xb8d0}}, {{0xa, 0x4e24, 0x4, @dev={0xfe, 0x80, [], 0x12}, 0x800}}, {{0xa, 0x4e21, 0xa540, @loopback, 0x5}}, {{0xa, 0x4e22, 0x3f, @remote, 0xbc64}}, {{0xa, 0x4e20, 0x800, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x27}}, 0x10000}}]}, 0x410) 12:07:05 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x40002, &(0x7f0000000000)=""/193, 0x33) [ 811.505131] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. [ 811.580612] hfs: unable to load codepage "none" [ 811.606373] hfs: unable to parse mount options 12:07:05 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f00000018c0)=@hopopts={0x3b, 0x2, [], [@enc_lim={0x4, 0x1, 0xfffffffffffffffe}, @hao={0xc9, 0x10, @empty}]}, 0x20) [ 811.725783] hfs: unable to load codepage "none" [ 811.735457] hfs: unable to parse mount options 12:07:05 executing program 2: getpid() syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f00000003c0)='./file0\x00', 0x9, 0xaaaaaaaaaaaabe0, &(0x7f0000000140)=[{&(0x7f00000000c0)="0a78c90e4979e8628b4b50b82d9b1ffa6640c1635fd2154046f5e04865957b2a536dbdbbcf51d66a7113371867d3a5512ac21af286a957abfa854895cc2823547fc256716fc6bc979d70a917337a89370f88a8e2275f02af0e8ded66374077067d8da30fbfcd55e55a991257d5754a7e08d5ba64265320", 0x77, 0x9}], 0x100000, &(0x7f0000000180)={[{@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@fault_injection={'fault_injection'}}], [{@smackfstransmute={'smackfstransmute'}}, {@smackfsdef={'smackfsdef'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={0x0, 0x1}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000300)={r1, @in={{0x2, 0x4e23, @empty}}, 0x4, 0x4}, 0x90) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000240)) r2 = getpgrp(0x0) sched_setaffinity(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0x28) [ 811.849260] hfs: unable to load codepage "none" [ 811.854429] hfs: unable to parse mount options [ 811.949989] hfs: unable to load codepage "none" [ 811.958828] hfs: unable to parse mount options [ 812.088709] hfs: unable to load codepage "none" [ 812.100022] hfs: unable to parse mount options 12:07:06 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffff9c, 0x0, 0x4, &(0x7f0000000000)='C\'(\x00'}, 0x30) ioprio_set$pid(0x2, r0, 0x0) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000080)={'ipvs\x00'}, &(0x7f00000000c0)=0x1e) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:07:06 executing program 3: sched_setaffinity(0x0, 0xfffffffffffffdbb, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x28c901, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@empty, @in6=@empty, 0x4e24, 0x3f, 0x4e23, 0x1, 0x2, 0x20, 0xa0, 0x3a, r2, r3}, {0x9, 0x5, 0x6, 0x1b, 0x9, 0x6, 0x17aa, 0xa3a}, {0x7ff, 0x3f, 0x7}, 0xc6a, 0x6e6bb3, 0x2, 0x1, 0x2, 0x2}, {{@in=@rand_addr=0x6, 0x4d6}, 0x2, @in=@empty, 0x0, 0x7, 0x3, 0x11e9, 0x2, 0x75, 0x3}}, 0xe8) 12:07:06 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x4c, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:07:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, &(0x7f0000000040), 0x1) syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f00000001c0)={0x72, {{0xa, 0x4e20, 0x81, @rand_addr="f5930a02636fcaf1200b96484924074f", 0x3}}, 0x0, 0x7, [{{0xa, 0x4e24, 0x0, @mcast2, 0x7f}}, {{0xa, 0x4e21, 0x8000, @remote, 0x7}}, {{0xa, 0x4e23, 0x4, @empty, 0xb8d0}}, {{0xa, 0x4e24, 0x4, @dev={0xfe, 0x80, [], 0x12}, 0x800}}, {{0xa, 0x4e21, 0xa540, @loopback, 0x5}}, {{0xa, 0x4e22, 0x3f, @remote, 0xbc64}}, {{0xa, 0x4e20, 0x800, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x27}}, 0x10000}}]}, 0x410) 12:07:06 executing program 5: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:07:06 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={r0}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000040)=@assoc_value={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r2, @in={{0x2, 0x4e22, @local}}, 0x8, 0x1, 0x101, 0x4, 0x8}, 0x98) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 812.370685] hfs: unable to load codepage "none" [ 812.383473] hfs: unable to parse mount options 12:07:06 executing program 2: r0 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x3, 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x772}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000280)={r1, 0x20, 0x3}, 0x8) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x800, 0x2, 0x100000001, 0x4, 0x6}, &(0x7f0000000080)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f00000000c0)={r3, 0x3b10}, &(0x7f0000000100)=0x8) syslog(0xf, &(0x7f0000000140)=""/94, 0x5e) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) setsockopt$llc_int(r2, 0x10c, 0x7, &(0x7f00000002c0)=0x8, 0x4) [ 812.418944] hfs: unable to load codepage "none" [ 812.423650] hfs: unable to parse mount options [ 812.464637] hfs: unable to load codepage "none" [ 812.477113] hfs: unable to parse mount options 12:07:06 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffff9c, 0x0, 0x4, &(0x7f0000000000)='C\'(\x00'}, 0x30) ioprio_set$pid(0x2, r0, 0x0) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000080)={'ipvs\x00'}, &(0x7f00000000c0)=0x1e) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:07:06 executing program 2: sched_setaffinity(0x0, 0x379, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x2, 0x800) ioctl$BLKROSET(r0, 0x125d, &(0x7f00000000c0)=0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000a40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1000, 0x1018, 0x2, {"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"}}, {0x0, "bdab2001d0205e4808e485218deb2e8c69e3c3975bb1f44ae4271fa6d0d892d63505280f613d78b174a6668331ea13a19245f37be266a99bebd70b532c838b2bea3925d6efafd72e306b6d2f06b08b2fb6ca74737c168af62dc8dfde9bee5f6367e3b5eec5540c9e463bedc9872bad9d56130153f13490efc9791a3a8307bd8c59f5bc7c0632"}}, &(0x7f0000000000)=""/30, 0x10a0, 0x1e, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 812.535698] hfs: unable to load codepage "none" [ 812.541868] hfs: unable to parse mount options [ 812.584116] hfs: unable to load codepage "none" [ 812.590392] hfs: unable to parse mount options 12:07:06 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x60, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:07:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, &(0x7f0000000040), 0x1) syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:07:06 executing program 5: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0xfffffffffffffc87, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0f56bea53d262b5f2fe383d8bef543428dd01d815d27bfd02cc58ebee3a4c323091c5a7fa5da8504fef0ac49ffca574a828d5648e9b196c871b1f5187c350ad19957e5c42da69e25de99aa58c9dceb42ae34524ef581fd946da9d17e413fe0b5290effb1a1b4c9e6602d51de82f7974ecdaed7a65f1bf34c0ca5130c2c36eef604c5b548a7613f0684a2038d3ddab76894977ed05ee535924a0392135c94dd13b91793b36224c8f4765252fc0737"]) mkdir(&(0x7f0000000140)='./file0\x00', 0x4) umount2(&(0x7f0000000100)='./file0\x00', 0xd) 12:07:06 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x80000021) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x301200, 0x0) mkdirat$cgroup(r0, &(0x7f0000000040)='syz0\x00', 0x1ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:07:06 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000001c0)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x41, 0x0) ioctl$VIDIOC_S_EDID(r1, 0xc0285629, &(0x7f0000000080)={0x0, 0x1, 0x3, [], &(0x7f0000000040)=0x5}) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:07:06 executing program 3: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) mlockall(0x1) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) lseek(r0, 0x0, 0x4) 12:07:06 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000040)=0x200080, 0x4) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:07:06 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x68, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:07:06 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"]) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0xcb) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000001c0)) [ 812.974886] audit: type=1804 audit(1547813226.929:82): pid=5595 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir227258966/syzkaller.nOMPDs/1125/bus" dev="sda1" ino=16658 res=1 [ 813.077819] hfs: unable to load codepage "none" [ 813.082836] hfs: unable to parse mount options 12:07:07 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) r0 = shmget$private(0x0, 0x1000, 0x54000102, &(0x7f0000ffc000/0x1000)=nil) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000200)=""/111) r1 = getpgid(0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000000)=0x80000001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x200, 0x0) rt_sigtimedwait(&(0x7f0000000100)={0x7}, &(0x7f0000000140), &(0x7f00000001c0)={0x77359400}, 0x8) r3 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000000c0)={0x3, 0x13, 0x1, r3}) 12:07:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, &(0x7f0000000040), 0x1) 12:07:07 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) [ 813.255122] hfs: unable to load codepage "ÿ" [ 813.259682] hfs: unable to parse mount options 12:07:07 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x6c, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 813.409476] hfs: unable to load codepage "ÿ" [ 813.417263] hfs: unable to parse mount options 12:07:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x1) 12:07:07 executing program 5: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:07:07 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x20000, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000080)={0x2, 0x2, [{0xc27, 0x0, 0x3}, {0x3}]}) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:07:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x1) 12:07:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x1) 12:07:08 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x74, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:07:08 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400, 0x0) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000040)=0x1, 0x4) rt_sigreturn() 12:07:08 executing program 3: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) mlockall(0x1) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) lseek(r0, 0x0, 0x4) 12:07:08 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x2, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:07:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000040), 0x1) 12:07:08 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f00000000c0)=0x1, 0x4) r1 = gettid() ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)={0x3, 0xffffffffffffff9c}) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000040)=r1) 12:07:08 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="636f642c0000003acbd82774e586fa46"]) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000200}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, r1, 0xa22, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x10000}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4004}, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x3, 0x40) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000040)=0x1c, 0x4) setsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000240)=0x20, 0x2) socket$inet_smc(0x2b, 0x1, 0x0) 12:07:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000040), 0x1) [ 814.319808] hfs: unable to parse mount options 12:07:08 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x7a, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 814.367314] audit: type=1804 audit(1547813228.320:83): pid=5683 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir227258966/syzkaller.nOMPDs/1126/bus" dev="sda1" ino=17302 res=1 12:07:08 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0xfffffffffffffffd, &(0x7f0000000040)='f\x03\xd0!\xb1\xab%\x0eg\xa8\xda \xd0J\x90\xac') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000180)=@v3={0x3000000, [{0x10000, 0x1}, {0x9495, 0x3}]}, 0x18, 0x2) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:07:08 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x2, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) tgkill(r0, r2, 0x5) 12:07:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000040), 0x1) 12:07:08 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x4, 0x4000) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000040)={0x1, 0x3ff, 0x4, 0x5}, 0x10) syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:07:08 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x300, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 814.828152] hfs: unable to load codepage "none" [ 814.832966] hfs: unable to parse mount options [ 814.851913] hfs: unable to load codepage "none" [ 814.877146] hfs: unable to parse mount options [ 814.971420] hfs: unable to load codepage "none" [ 814.986272] hfs: unable to parse mount options [ 815.003710] hfs: unable to load codepage "none" [ 815.011226] hfs: unable to parse mount options 12:07:09 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x2, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:07:09 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @aes128, 0x1, "c5733f4ff3395632"}) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:07:09 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xad) 12:07:09 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, &(0x7f0000000040), 0x1) 12:07:09 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:07:09 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x500, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:07:09 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, &(0x7f0000000040), 0x1) [ 815.310719] hfs: unable to load codepage "none" [ 815.336600] hfs: unable to parse mount options 12:07:09 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x9, &(0x7f0000000940)=""/193, 0xc1) 12:07:09 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r2 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x0, 0x2) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4220000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x44, r1, 0x0, 0x70bd2d, 0x25dfdbfb, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x3}, @NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8, 0x1, r2}]}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x44}, 0x1, 0x0, 0x0, 0x8000}, 0x20000804) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) sendto$unix(r2, &(0x7f0000000200)="05210e95230aacf355b4ed90d33a6066205b449ca001c206a4925d89d1c8617890b8c2f41a972a9d1267bc85f6d51660116bfdf19a2b", 0x36, 0x0, &(0x7f0000000240)=@abs={0x1, 0x0, 0x4e21}, 0x6e) 12:07:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, &(0x7f0000000040), 0x1) syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 815.440147] hfs: unable to load codepage "none" [ 815.457771] hfs: unable to parse mount options [ 815.521226] hfs: unable to load codepage "none" [ 815.526141] hfs: unable to parse mount options 12:07:09 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rfkill\x00', 0x400000, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f00000004c0)={0xf4}, 0x4) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0xad, {0x80000001, 0x80000000, 0x9, 0x80000000, 0x81, 0x800}, 0x1ff, 0x8}, 0xe) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@mcast1, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20002000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@gettclass={0x24, 0x2a, 0x800, 0x70bd2b, 0x25dfdbfd, {0x0, r1, {0xf, 0x3}, {0xffe5, 0x8}, {0xe, 0xfffb}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000800}, 0x0) 12:07:09 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, &(0x7f0000000040), 0x1) 12:07:09 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) r1 = dup2(r0, r0) sendto$ax25(r1, &(0x7f0000000000)="b8da934d99fefe4583fc8c36ff04837da1c2757cac4b976e58a1d209c6d8ac2bfa5625a801286b29ceb0bc436b3b033832ea2822127ad1115747b9636cff24d0aaf62fe5c0c3cb41acc2b01d8864b28cf59c61d4e2c1954121e394bdbd72b0cf9b6286e1de222f67ebc9bb3fe6d14b761080082313f6f446061cedcde74f975c1517618e31f2fcc8fdf52918aec63413415d1c504e649eac89494a24d2feec4116a67102b0c27224dd030cd0e5c1896a114e939c201221de39a44f28e4b2f5e0848923fae0b215cf", 0xc8, 0x40, &(0x7f0000000100)={{0x3, @null, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 12:07:09 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, &(0x7f0000000040), 0x1) 12:07:09 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) getpgrp(0xffffffffffffffff) getpid() fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r2, &(0x7f0000000100), 0x10000000000001db, 0x0, 0x27b, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:07:09 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x600, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:07:09 executing program 2: r0 = getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000080)=0x0) sched_setaffinity(r1, 0xfffffe85, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xf, &(0x7f0000000000)='ppp0}@keyring+\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r2, 0x0) kcmp(r1, r0, 0x7, r2, r2) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:07:09 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, &(0x7f0000000040), 0x1) 12:07:09 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) ioctl$VIDIOC_S_MODULATOR(0xffffffffffffffff, 0x40445637, &(0x7f0000000000)={0x7ff, "2ebb184fad43505dd1033bf9a161335e76df4014a92f27fa74003f50d00922dd", 0x10, 0x4, 0x200, 0x4, 0x2}) [ 815.919849] hfs: unable to load codepage "none" [ 815.925101] hfs: unable to parse mount options [ 815.949438] hfs: unable to load codepage "none" [ 815.955422] hfs: unable to parse mount options 12:07:10 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, &(0x7f0000000040), 0x1) [ 816.138431] hfs: unable to load codepage "none" [ 816.144944] hfs: unable to parse mount options [ 816.161698] hfs: unable to load codepage "none" 12:07:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, &(0x7f0000000040), 0x1) syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:07:10 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x10) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 816.199775] hfs: unable to parse mount options 12:07:10 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1f, 0x2000) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000040)) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000080)={0x10201, 0x0, &(0x7f0000ffc000/0x3000)=nil}) ioctl$TCFLSH(r0, 0x800455ca, 0x0) syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="635b6465706167653d6e6f6e652c00a8b67d5b777830c83ab2de9f3c627ce1a3bca141137c505d45e4c172edbc556318e406a0275d04e755ba1559b2ea0baa94b7fd54439bfc6661181be1a5af6fa917bdba438cf05406bcb06300d4da66889adf5aac01ae297ac491ef1ef0b3"]) 12:07:10 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xfca9, 0x28440) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000040), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:07:10 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, &(0x7f0000000040), 0x1) [ 816.418577] hfs: unable to load codepage "none" [ 816.452899] hfs: unable to parse mount options 12:07:10 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040)={0xc75}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000080)={'ip6gretap0\x00', 0x80000000}) 12:07:10 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@initdev}}, &(0x7f00000001c0)=0xe8) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000200)={r1, @dev={0xac, 0x14, 0x14, 0x24}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x9, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x401, 0x0) ioctl$RNDGETENTCNT(r2, 0x80045200, &(0x7f0000000040)) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:07:10 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x700, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 816.584172] hfs: unable to parse mount options 12:07:10 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000040), 0x1) [ 816.607777] hfs: unable to load codepage "none" [ 816.620554] hfs: unable to parse mount options 12:07:10 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x100, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x80) [ 816.712935] hfs: unable to parse mount options 12:07:10 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x10040) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000200)=0x0) r3 = getuid() getgroups(0x6, &(0x7f0000000240)=[0xee01, 0x0, 0xee01, 0xffffffffffffffff, 0xee01, 0x0]) r5 = getpgid(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in=@empty, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r8 = getegid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000003c0)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8) fstat(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000440)=0x0) r14 = getuid() fstat(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r0, 0x10, &(0x7f00000006c0)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000700)={0x0, 0x0}, &(0x7f0000000740)=0xc) getresgid(&(0x7f0000000780)=0x0, &(0x7f00000007c0), &(0x7f0000000800)) sendmsg$unix(r1, &(0x7f0000000900)={&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000001c0)=[{&(0x7f00000000c0)="45b30cc329de9350094250d64648f73941539146e5e030b4b84b1052ab77a2220eda8f1f2c53748124baaf97bc17412523706209ef448bfb3236cc917d9d436fe6dcf25ee8644e5cc066be2fd2c40817a11e4fb38fa46518cef96a30f68a7c21b6300b5ba806cfd8fce47049b75a32069cefd001a9904458a82c65b266f2db5d94f2a4cadfc3c80a46668197549d91089e307d354a929c94eb3b751fef1e9d9bf023f9b2e53df7d96b912e15a34c7e39fbeaf5379bb433a728a52b45b2d75e286ebf65144231c0d9c5ec8cc8d2870f13933559cd101c67c9ca8e4289fe39f532c3bfebd390a9bf5ea57dd422a46bf18dffd2a9c8eb677001d2c81e94", 0xfc}], 0x1, &(0x7f0000000840)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @cred={0x20, 0x1, 0x2, r5, r7, r8}, @cred={0x20, 0x1, 0x2, r9, r11, r12}, @cred={0x20, 0x1, 0x2, r13, r14, r16}, @cred={0x20, 0x1, 0x2, r17, r18, r19}], 0xa0}, 0x20000000) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000000f00)={"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"}) r20 = syz_open_dev$midi(&(0x7f0000000a40)='/dev/midi#\x00', 0x7, 0xe002) sendmsg$nl_xfrm(r20, &(0x7f0000000ec0)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000ac0)=@polexpire={0x3a4, 0x1b, 0x300, 0x70bd2a, 0x25dfdbfb, {{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@mcast1, 0x4e22, 0x0, 0x4e24, 0x0, 0xa, 0xa0, 0x0, 0x0, r6, r15}, {0x20, 0x1, 0x400, 0x9, 0x8, 0x1a, 0x80000001}, {0x200, 0x1, 0x9, 0x8}, 0x4, 0x6e6bbd, 0x1, 0x1, 0x1, 0x1}, 0xffff}, [@extra_flags={0x8, 0x18, 0x800}, @encap={0x1c, 0x4, {0xffffffffffffffff, 0x4e24, 0x4e20, @in=@dev={0xac, 0x14, 0x14, 0x23}}}, @policy={0xac, 0x7, {{@in=@multicast2, @in6=@rand_addr="d7b5d7c4e04a584bfee1c48b745781cd", 0x4e20, 0x3f, 0x4e22, 0x0, 0xa, 0x0, 0xa0, 0x87, r10, r3}, {0x8, 0x3ff, 0x6, 0x10000, 0x7ff, 0x4, 0x400, 0x4}, {0x9, 0x80, 0x4, 0x1}, 0x6, 0x6e6bbe, 0x2, 0x0, 0x2, 0x3}}, @ipv6_hthresh={0x8, 0x4, {0x55, 0x54}}, @algo_crypt={0xcc, 0x2, {{'ctr-aes-neon\x00'}, 0x418, "1d093aead392f1fa6623797dbcf02b722831b4fefc3f03a01be933465e7102b21fcd277b873e85be941fa89c47c4414b32618260e22bbca3ef3fb3902a0d1264ef843893bc7eeeff5922f9b8d9317dd996e23b2db6134a62977842b32ced61f9384697b99bcbddc634b0b1a7be84703fad131a5c12f16b064e2c7a8309f95b9b5fd138"}}, @algo_auth_trunc={0x50, 0x14, {{'sha384\x00'}, 0x20, 0x100, "4eb03bda"}}, @sa={0xe4, 0x6, {{@in=@dev={0xac, 0x14, 0x14, 0xe}, @in6=@empty, 0x4e21, 0x3, 0x4e24, 0x8, 0xa, 0x80, 0x20, 0x0, r6, r15}, {@in6=@mcast1, 0x4d4, 0x32}, @in6=@empty, {0x1000, 0x8, 0x1, 0xbf, 0x0, 0x20000, 0x2, 0x5fd}, {0xb90, 0x5, 0x0, 0x1000}, {0x8, 0x3, 0x8001}, 0x70bd26, 0x3501, 0xa, 0x5, 0x0, 0x8}}, @policy_type={0xc, 0x10, {0x1}}]}, 0x3a4}, 0x1, 0x0, 0x0, 0x4000}, 0x20000004) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) 12:07:10 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000040), 0x1) [ 816.825605] hfs: unable to load codepage "none" [ 816.831807] hfs: unable to parse mount options 12:07:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, &(0x7f0000000040), 0x1) syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:07:10 executing program 5: r0 = open(&(0x7f0000000040)='./file1\x00', 0x200000, 0x8) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f0000000080)={[{0x6, 0x8, 0x6, 0x1, 0x6, 0xbd5b, 0x80000000, 0x9, 0x9, 0x2e9, 0x0, 0x5, 0x1f}, {0x2b6, 0x3, 0x3, 0xc032, 0x200, 0x5, 0x5, 0x7, 0x9, 0x7, 0x100010000000, 0x7fffffff, 0x4}, {0xff, 0x1, 0x1, 0x100000000, 0x1c, 0x1, 0xffffffffffffff80, 0xffffffffffffffe7, 0x7119, 0x0, 0xc8, 0x4, 0x5}], 0x6}) syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) r1 = memfd_create(&(0x7f0000000000)='hfs\x00', 0x1) dup(r1) 12:07:10 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000080)=0x0) ioprio_set$pid(0x3, r2, 0x2) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000040)=0x1f) 12:07:10 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000040), 0x1) [ 817.002404] hfs: unable to load codepage "none" [ 817.007115] hfs: unable to parse mount options 12:07:11 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:07:11 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0xa00, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:07:11 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x101000, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000040)={0xb4, 0x8, 0x6, 0x7, 0x1}) socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:07:11 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x1) 12:07:11 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80000, 0x0) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0xd000) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 817.272348] hfs: unable to load codepage "none" [ 817.305451] hfs: unable to parse mount options [ 817.311288] hfs: unable to load codepage "none" [ 817.322231] hfs: unable to parse mount options [ 817.374243] hfs: unable to load codepage "none" [ 817.396222] hfs: unable to parse mount options 12:07:11 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x1) [ 817.444888] hfs: unable to load codepage "none" [ 817.451193] hfs: unable to parse mount options 12:07:11 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) read(r2, &(0x7f0000000240)=""/61, 0x3d) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) syz_emit_ethernet(0x32, &(0x7f0000000140)={@random="33e6dcf3c67a", @random="02f126e91642", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @broadcast}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "ffb4ee", 0x0, "915b66"}}}}}}, 0x0) 12:07:11 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x4400, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0x40000000}) syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:07:11 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x1) [ 817.622346] hfs: unable to load codepage "none" [ 817.627607] hfs: unable to parse mount options 12:07:11 executing program 2: sched_setaffinity(0x0, 0xfffffffffffffcfe, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/117) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:07:11 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r0, 0xaead) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:07:11 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0xf1a, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:07:11 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) 12:07:11 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000600)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0x8, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x81}, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 817.847067] hfs: unable to load codepage "none" [ 817.856839] hfs: unable to parse mount options 12:07:11 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dsp\x00', 0x8100, 0x0) bind$rds(r0, &(0x7f0000000380)={0x2, 0x4e24, @multicast1}, 0x10) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000100)={{0x1d, @remote, 0x4e24, 0x1, 'ovf\x00', 0x8, 0xfffffffeffffffff, 0x9}, {@local, 0x4e21, 0x1, 0x4, 0x1, 0x7f}}, 0x44) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xfff, 0x20000) getsockopt$inet_tcp_int(r2, 0x6, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) socket$inet_tcp(0x2, 0x1, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:07:11 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x0) 12:07:11 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x80180, 0x0) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000040)={0x8000, 0x9}) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x2) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$int_in(r1, 0x800000800c5012, &(0x7f0000000100)) [ 817.974619] hfs: unable to load codepage "none" [ 817.983325] hfs: unable to parse mount options 12:07:12 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) write$P9_RFLUSH(r0, &(0x7f0000000000)={0x7, 0x6d, 0x1}, 0x7) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000040)={0x0, @reserved}) 12:07:12 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) move_pages(r0, 0x1, &(0x7f0000000040)=[&(0x7f0000ffb000/0x2000)=nil], &(0x7f0000000080)=[0x1, 0x3, 0x1, 0x8000, 0xfffffffffffffffc, 0x6], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) r1 = open(&(0x7f0000000100)='./file0\x00', 0x24040, 0x6) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0xf) [ 818.112064] hfs: unable to load codepage "none" [ 818.116926] hfs: unable to parse mount options 12:07:12 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x0) 12:07:12 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x1020, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:07:12 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x12000, 0x0) sendto$rxrpc(r0, &(0x7f0000000040)="6bdddf51efcc22d652a99f21124abd03a9bddae81701b18c770fa0c079c7d1fbae711aec8577e4321da32099117d813321371e101df42e8c54de4f77fc7451b4709d3bc0654cf4e045aac6f88588c224801080e222d2d0fb1c821c977b53107dd35b63d0c77c812b9b382ac6549dfb5e", 0x70, 0x80, &(0x7f00000000c0)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e24, 0x7fffffff, @remote, 0x2}}, 0x24) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) r1 = getpgrp(0x0) ptrace(0x19, r1) [ 818.269053] audit: type=1800 audit(1547813232.232:84): pid=5998 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor2" name="file0" dev="sda1" ino=17217 res=0 [ 818.323764] hfs: unable to load codepage "none" [ 818.328670] hfs: unable to parse mount options 12:07:12 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x21, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000000)={0xeb, 0x3, 0x8, 0x6}, 0x8) 12:07:12 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x0) 12:07:12 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)=0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x10280, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r0, r1, 0x0, 0x3, &(0x7f00000000c0)='\'$\x00', r2}, 0x30) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r4 = dup3(r3, r3, 0x80000) ioctl$BLKGETSIZE(r4, 0x1260, &(0x7f0000000000)) [ 818.483871] hfs: unable to load codepage "none" [ 818.488592] hfs: unable to parse mount options 12:07:12 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x40000, 0x0) 12:07:12 executing program 3: r0 = gettid() pause() timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x80080, 0x0) tkill(r0, 0x1004000000016) 12:07:12 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x1a0f, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:07:12 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x8040, 0x0) setsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000040)=0x1, 0x4) 12:07:12 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000040)={0x3, 0x8, 0x2}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000080)={0x3, 0xff, 0x1, 0xffff, 0x1ff, 0x3ff}) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:07:12 executing program 4 (fault-call:2 fault-nth:0): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) [ 818.849416] FAULT_INJECTION: forcing a failure. [ 818.849416] name failslab, interval 1, probability 0, space 0, times 0 [ 818.913429] CPU: 1 PID: 6044 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #31 [ 818.920572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 818.929931] Call Trace: [ 818.932546] dump_stack+0x1db/0x2d0 [ 818.936189] ? dump_stack_print_info.cold+0x20/0x20 [ 818.941246] should_fail.cold+0xa/0x15 [ 818.945166] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 818.950291] ? ___might_sleep+0x1e7/0x310 [ 818.954451] ? arch_local_save_flags+0x50/0x50 12:07:12 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'none'}}], [{@hash='hash'}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}) 12:07:12 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) userfaultfd(0x80000) 12:07:12 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r0, 0x0, 0x8, &(0x7f0000000000)='trusted\x00'}, 0x30) capset(&(0x7f0000000080)={0x0, r1}, &(0x7f00000000c0)={0xbe, 0x6, 0x10001, 0x7fffffff, 0x80000001, 0x100000001}) prctl$PR_GET_KEEPCAPS(0x7) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 818.959048] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 818.965220] __should_failslab+0x121/0x190 [ 818.969485] should_failslab+0x9/0x14 [ 818.973309] kmem_cache_alloc_trace+0x2d1/0x760 [ 818.978014] alloc_pipe_info+0x152/0x580 [ 818.982095] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 818.987637] ? pipe_read+0x940/0x940 [ 818.991383] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 818.996351] ? common_file_perm+0x231/0x800 [ 819.000710] splice_direct_to_actor+0x795/0x9d0 [ 819.005392] ? iterate_fd+0x4b0/0x4b0 [ 819.009198] ? generic_pipe_buf_nosteal+0x10/0x10 [ 819.014074] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 819.019643] ? do_splice_to+0x190/0x190 [ 819.023622] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 819.029170] ? rw_verify_area+0x118/0x360 [ 819.033331] do_splice_direct+0x2c7/0x420 [ 819.035257] cgroup: fork rejected by pids controller in /syz1 [ 819.037504] ? splice_direct_to_actor+0x9d0/0x9d0 [ 819.037564] ? rcu_read_lock_sched_held+0x110/0x130 [ 819.037579] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 819.037593] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 12:07:13 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x4) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000040)={0xaaf, 0x80}) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 819.037607] ? __sb_start_write+0x1ac/0x360 [ 819.037628] do_sendfile+0x61a/0xe60 [ 819.037657] ? do_compat_pwritev64+0x1c0/0x1c0 [ 819.076463] ? fput+0x128/0x1a0 [ 819.079761] ? do_syscall_64+0x8c/0x800 [ 819.083743] ? do_syscall_64+0x8c/0x800 [ 819.087735] __x64_sys_sendfile64+0x1f8/0x240 [ 819.092244] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 819.096830] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 819.101599] do_syscall_64+0x1a3/0x800 [ 819.105526] ? syscall_return_slowpath+0x5f0/0x5f0 [ 819.110465] ? prepare_exit_to_usermode+0x232/0x3b0 [ 819.115510] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 819.120383] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 819.125584] RIP: 0033:0x458099 [ 819.128783] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 819.147687] RSP: 002b:00007f3fd1906c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 819.155398] RAX: ffffffffffffffda RBX: 00007f3fd1906c90 RCX: 0000000000458099 12:07:13 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000840)=':wlan0trusted\x00', 0xffffffffffffffff}, 0x30) r0 = getpgrp(0xffffffffffffffff) sched_setaffinity(r0, 0x248, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x10000004, &(0x7f0000000740)=""/193, 0xd48fa9df0797b642) write$binfmt_aout(r1, &(0x7f0000000000)={{0x1cf, 0x100, 0xffffffffffff09d1, 0x1f5, 0xe5, 0x30f0, 0x18d, 0x80000000}, "7ba95ca69e7715c4c395df74396c36208a60b075d1e0c6b9e583", [[], [], [], [], [], [], []]}, 0x73a) [ 819.162674] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 819.169943] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 819.177219] R10: 0000000000000001 R11: 0000000000000246 R12: 00007f3fd19076d4 [ 819.184499] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000005 12:07:13 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x4004, &(0x7f0000000100)=""/193, 0x96c49fddce3c793a) 12:07:13 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)='^\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs(r0, &(0x7f0000000080)='net/udp6\x00') sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 819.492174] hfs: unable to load codepage "none" 12:07:13 executing program 3: setuid(0xee01) setfsuid(0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x4840, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000040)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000000180)={0x3, @default, r1}) 12:07:13 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x1f00, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 819.512563] hfs: unable to parse mount options 12:07:13 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 819.622105] hfs: unable to load codepage "none" [ 819.639709] hfs: unable to parse mount options 12:07:13 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x2, 0x0) write$P9_RRENAMEAT(r1, &(0x7f0000000280)={0x7, 0x4b, 0x2}, 0x7) r2 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x1f, 0x20000) ioctl$VIDIOC_S_INPUT(r2, 0xc0045627, &(0x7f0000000200)=0x6) setgroups(0x4000000000000015, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00007e5000)={0xffffffffffffffff}) getsockopt$sock_buf(r3, 0x1, 0x1c, &(0x7f0000000000)=""/92, &(0x7f00000000c0)=0x5c) r4 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x200, 0x14080) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000140)=0x14) 12:07:13 executing program 4 (fault-call:2 fault-nth:1): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) 12:07:13 executing program 5: truncate(&(0x7f0000000000)='./file0\x00', 0x92de) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x401, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="636f6465706167653d6d6163677265656b2c756d6100103d30303030303030303030303030303030303030303030302c00"]) 12:07:13 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x8, 0x806, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000000)={0x9}, 0x1) syslog(0x2, &(0x7f0000000940)=""/193, 0xffffff8a) 12:07:13 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 819.821324] FAULT_INJECTION: forcing a failure. [ 819.821324] name failslab, interval 1, probability 0, space 0, times 0 [ 819.881101] CPU: 0 PID: 6098 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #31 [ 819.888265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 819.897652] Call Trace: [ 819.900279] dump_stack+0x1db/0x2d0 [ 819.903938] ? dump_stack_print_info.cold+0x20/0x20 [ 819.908963] ? percpu_ref_put_many+0x129/0x270 [ 819.913552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 819.919118] should_fail.cold+0xa/0x15 [ 819.923017] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 819.928147] ? ___might_sleep+0x1e7/0x310 [ 819.932324] ? arch_local_save_flags+0x50/0x50 [ 819.937014] __should_failslab+0x121/0x190 [ 819.941261] should_failslab+0x9/0x14 [ 819.945073] __kmalloc+0x2dc/0x740 [ 819.948626] ? kmem_cache_alloc_trace+0x354/0x760 [ 819.953485] ? alloc_pipe_info+0x286/0x580 [ 819.957746] alloc_pipe_info+0x286/0x580 [ 819.961825] ? pipe_read+0x940/0x940 [ 819.965561] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 819.970517] ? common_file_perm+0x231/0x800 [ 819.974863] splice_direct_to_actor+0x795/0x9d0 [ 819.979560] ? iterate_fd+0x4b0/0x4b0 [ 819.983394] ? generic_pipe_buf_nosteal+0x10/0x10 [ 819.988239] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 819.993763] ? do_splice_to+0x190/0x190 [ 819.997737] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 820.003277] ? rw_verify_area+0x118/0x360 [ 820.007437] do_splice_direct+0x2c7/0x420 [ 820.011595] ? splice_direct_to_actor+0x9d0/0x9d0 [ 820.016436] ? rcu_read_lock_sched_held+0x110/0x130 [ 820.022130] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 820.026874] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 820.032402] ? __sb_start_write+0x1ac/0x360 [ 820.036713] do_sendfile+0x61a/0xe60 [ 820.040421] ? do_compat_pwritev64+0x1c0/0x1c0 [ 820.045013] ? fput+0x128/0x1a0 [ 820.048282] ? do_syscall_64+0x8c/0x800 [ 820.052266] ? do_syscall_64+0x8c/0x800 [ 820.056244] __x64_sys_sendfile64+0x1f8/0x240 [ 820.060724] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 820.065292] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 820.070036] do_syscall_64+0x1a3/0x800 [ 820.073923] ? syscall_return_slowpath+0x5f0/0x5f0 [ 820.078850] ? prepare_exit_to_usermode+0x232/0x3b0 [ 820.083878] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 820.088726] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 820.093897] RIP: 0033:0x458099 [ 820.097073] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 820.115956] RSP: 002b:00007f3fd1906c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 820.123672] RAX: ffffffffffffffda RBX: 00007f3fd1906c90 RCX: 0000000000458099 [ 820.130930] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 820.138181] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 820.145437] R10: 0000000000000001 R11: 0000000000000246 R12: 00007f3fd19076d4 [ 820.152690] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000005 [ 820.330818] hfs: unable to parse mount options 12:07:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x5a) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000040)) socket$alg(0x26, 0x5, 0x0) sendto$inet6(r0, &(0x7f0000000180)='\a', 0x1, 0x0, 0x0, 0x0) 12:07:16 executing program 2: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) sched_setaffinity(r0, 0x3c7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigreturn() syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:07:16 executing program 4 (fault-call:2 fault-nth:2): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) 12:07:16 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x2010, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:07:16 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)=ANY=[@ANYBLOB="636f64687061676571e05469c982f5"]) 12:07:16 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x8ba3, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001fc0)=0x14) sendmmsg(r0, &(0x7f0000003300)=[{{&(0x7f0000002000)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="c36b8ab55629"}, 0x80, &(0x7f0000003280)=[{&(0x7f0000002080)="c78f06fab454ebc14a1037c42c3c3b9ccba1a6988406ef3a02ec518f94d12a5a944f941848790c6009624cb024352c0d5b16719787271a76d91ee04ede838350aaa762c3a9d99980ac0616c9171a57f7911a9fdef8b445415e3b162641620a09285c83a102ca556f0dd29c65c4e8fde10eb8acc3e44d26971b4b2668b4ccfd5ba7bd7ea4e4de1e106bf790adbc3ffea899c5bde27e97f3f003eb87e2803b4b5af2a531ee97009d91a0", 0xa9}, {&(0x7f0000002140)="a1c9fc1aa04a6b2da052812e7aa4f927c8108c99d22ded1b3ae7f4baa6551df9dfd605c9211a6e9bbb0ccf46b88c639dc5bbf8cc99591fba1471d5f87ba539e487f5cfc563d53caaa798fb64b1b85e055cea6f9f9d149164198f9a6d584aaf9d7d9b4ea2fcf7fbe2c9c40ace72b83b746551bb5e0a61491e8472cbd5f7ef", 0x7e}, {&(0x7f00000021c0)="97fa8d720788eda259a0f8251efea0249927d13175e257987a58c27791dfa5beb64ff6d588c43c5c59a6d65c0d618c8931b95d", 0x33}, {&(0x7f0000002200)="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", 0x1000}, {&(0x7f0000003200)="38f962b8c887ca805a69316b25bafc602bd2ff167eef3965e4e698d826a0aa71cce578258156d523d6cb523756209aedf83e453aa11e49251723aff8ab1c7be296209d61f98963364279f56d24130e7a0db2a2bf581c923260e293d983d11582cbad32e5d39757b2dc63f6e055838916bec3", 0x72}], 0x5}, 0x7}], 0x1, 0x4) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)=ANY=[@ANYBLOB="e0000002ac1414f4833cb572c0441fcd5d52931caef1d2bb0100020000003e2f14aa000000000000b0cc3ddb60b88f994343da245b75bf1a9f056d6dbeb2523ea424ef34e0e60ba34e83adb5d64923efa9deaab7aa3593033ac8390400"], 0x18) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3) r2 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x3, 0x200000) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) [ 822.218859] FAULT_INJECTION: forcing a failure. [ 822.218859] name failslab, interval 1, probability 0, space 0, times 0 [ 822.292937] CPU: 1 PID: 6134 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #31 [ 822.300074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 822.300097] Call Trace: [ 822.300121] dump_stack+0x1db/0x2d0 [ 822.300145] ? dump_stack_print_info.cold+0x20/0x20 [ 822.300164] ? print_usage_bug+0xd0/0xd0 [ 822.300187] ? check_preemption_disabled+0x48/0x290 [ 822.300215] should_fail.cold+0xa/0x15 [ 822.300236] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 822.329871] ? ___might_sleep+0x1e7/0x310 [ 822.329906] ? arch_local_save_flags+0x50/0x50 [ 822.329929] ? mark_held_locks+0x100/0x100 [ 822.329952] __should_failslab+0x121/0x190 [ 822.329972] should_failslab+0x9/0x14 [ 822.329990] kmem_cache_alloc_node_trace+0x270/0x720 [ 822.330008] ? debug_smp_processor_id+0x1c/0x20 [ 822.369720] ? perf_trace_lock_acquire+0x138/0x7d0 [ 822.374667] __kmalloc_node+0x3d/0x70 [ 822.378483] kvmalloc_node+0x68/0x100 [ 822.382313] iov_iter_get_pages_alloc+0x87f/0x15a0 [ 822.387258] ? aa_file_perm+0x42e/0x1090 [ 822.391329] ? find_held_lock+0x35/0x120 [ 822.395414] ? iov_iter_revert+0xaa0/0xaa0 [ 822.399662] ? lock_downgrade+0x910/0x910 [ 822.400243] hfs: unable to parse mount options [ 822.403813] ? kasan_check_read+0x11/0x20 [ 822.403832] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 822.403852] ? rcu_read_unlock_special+0x380/0x380 [ 822.403874] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 822.427773] ? iov_iter_pipe+0xba/0x2f0 [ 822.431764] default_file_splice_read+0x1b1/0xac0 [ 822.436637] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 822.442240] ? aa_path_link+0x5d0/0x5d0 [ 822.446240] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 822.451537] ? iter_file_splice_write+0xfc0/0xfc0 [ 822.456400] ? add_lock_to_list.isra.0+0x450/0x450 [ 822.461336] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 822.466899] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 822.472450] ? check_preemption_disabled+0x48/0x290 [ 822.477507] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 822.483069] ? fsnotify+0x4f5/0xed0 [ 822.486708] ? debug_mutex_init+0x2d/0x60 [ 822.490867] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 822.496415] ? __fsnotify_parent+0xe2/0x450 [ 822.500759] ? fsnotify_first_mark+0x350/0x350 [ 822.505364] ? apparmor_path_rmdir+0x30/0x30 [ 822.509785] ? alloc_pipe_info+0x286/0x580 [ 822.514047] ? security_file_permission+0x94/0x320 [ 822.518991] ? rw_verify_area+0x118/0x360 [ 822.523143] ? iter_file_splice_write+0xfc0/0xfc0 [ 822.527992] do_splice_to+0x12a/0x190 [ 822.531808] splice_direct_to_actor+0x31b/0x9d0 [ 822.536498] ? generic_pipe_buf_nosteal+0x10/0x10 [ 822.541361] ? do_splice_to+0x190/0x190 [ 822.545343] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 822.550893] ? rw_verify_area+0x118/0x360 [ 822.555094] do_splice_direct+0x2c7/0x420 [ 822.559275] ? splice_direct_to_actor+0x9d0/0x9d0 [ 822.564134] ? rcu_read_lock_sched_held+0x110/0x130 [ 822.569160] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 822.573939] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 822.579479] ? __sb_start_write+0x1ac/0x360 [ 822.583821] do_sendfile+0x61a/0xe60 [ 822.587560] ? do_compat_pwritev64+0x1c0/0x1c0 [ 822.592153] ? fput+0x128/0x1a0 [ 822.595436] ? do_syscall_64+0x8c/0x800 [ 822.599467] ? do_syscall_64+0x8c/0x800 [ 822.603519] __x64_sys_sendfile64+0x1f8/0x240 [ 822.608036] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 822.612627] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 822.617401] do_syscall_64+0x1a3/0x800 [ 822.621305] ? syscall_return_slowpath+0x5f0/0x5f0 [ 822.626267] ? prepare_exit_to_usermode+0x232/0x3b0 [ 822.631301] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 822.636162] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 822.641350] RIP: 0033:0x458099 [ 822.644553] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 822.663469] RSP: 002b:00007f3fd1906c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 822.671190] RAX: ffffffffffffffda RBX: 00007f3fd1906c90 RCX: 0000000000458099 [ 822.678457] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 822.685732] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 12:07:16 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) sched_setattr(r1, &(0x7f0000000180)={0x30, 0x5, 0x0, 0x5, 0x100, 0x2, 0x8555, 0xb8}, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000040)="94dcd9ddcd817d9994154a5c14f58bb5338f42fca90e731f67b00640968418125c4014baef133954303886855ac8c45f161c8ddd1837acb85b6fed2275a08d71329e99fc5ef31d62ef69f5460d002737192f440863b4a33d276bf620b1b6f13b2cb7") 12:07:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x5a) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000040)) socket$alg(0x26, 0x5, 0x0) sendto$inet6(r0, &(0x7f0000000180)='\a', 0x1, 0x0, 0x0, 0x0) 12:07:16 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 822.693010] R10: 0000000000000001 R11: 0000000000000246 R12: 00007f3fd19076d4 [ 822.700296] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000005 [ 822.759603] hfs: unable to parse mount options 12:07:16 executing program 4 (fault-call:2 fault-nth:3): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) 12:07:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x5a) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000040)) socket$alg(0x26, 0x5, 0x0) sendto$inet6(r0, &(0x7f0000000180)='\a', 0x1, 0x0, 0x0, 0x0) 12:07:16 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="636f6465706167653d6e6f6e652c007ad757b499152372e63705816f3ecddd569d45dc8ced9efacb0adb38a0cfa369d4d228ddb9460126a9b1ad9d25acc849c30b512870b3e2682d55c6cf4a5ff0903a836247a9be4726fca265d52fb175f9c5cd"]) r0 = accept(0xffffffffffffffff, &(0x7f0000000080)=@un=@abs, &(0x7f0000000100)=0x80) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)=0x0) fstat(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) r4 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r5 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r6 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x3, 0x2) r7 = openat$cgroup_int(0xffffffffffffff9c, &(0x7f00000003c0)='rdma.max\x00', 0x2, 0x0) r8 = eventfd(0x10001) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000580)=0xe8) getresgid(&(0x7f00000005c0)=0x0, &(0x7f0000000600), &(0x7f0000000640)) r12 = fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0, 0x0}, &(0x7f0000000780)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)=0x0) r16 = geteuid() r17 = getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000800)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @initdev}}, 0x0, @in6=@local}}, &(0x7f0000000940)=0xe8) r20 = getegid() sendmsg$unix(r0, &(0x7f0000000a80)={&(0x7f0000000140)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f00000001c0), 0x0, &(0x7f0000000980)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}, @rights={0x28, 0x1, 0x1, [r4, r5, r6, r7, r8]}, @cred={0x20, 0x1, 0x2, r9, r10, r11}, @cred={0x20, 0x1, 0x2, r12, r13, r14}, @cred={0x20, 0x1, 0x2, r15, r16, r17}, @cred={0x20, 0x1, 0x2, r18, r19, r20}], 0xc8, 0x4000004}, 0x40000) 12:07:16 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) getpeername$inet(r2, &(0x7f0000000080)={0x2, 0x0, @initdev}, &(0x7f00000000c0)=0x10) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f0000000000)={0x2400000000000000, 0x0, 0x3, 0x8, 0xf}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 822.945253] FAULT_INJECTION: forcing a failure. [ 822.945253] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 823.009507] CPU: 0 PID: 6157 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #31 [ 823.016645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 823.026001] Call Trace: [ 823.028598] dump_stack+0x1db/0x2d0 [ 823.032243] ? dump_stack_print_info.cold+0x20/0x20 [ 823.037279] ? kernel_text_address+0x73/0xf0 [ 823.041714] should_fail.cold+0xa/0x15 [ 823.045621] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 823.050750] ? arch_local_save_flags+0x50/0x50 [ 823.055340] ? lock_release+0xc40/0xc40 12:07:17 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x4000, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 823.059342] should_fail_alloc_page+0x50/0x60 [ 823.063845] __alloc_pages_nodemask+0x323/0xdc0 [ 823.068556] ? add_lock_to_list.isra.0+0x450/0x450 [ 823.073532] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 823.078593] ? __kmalloc_node+0x3d/0x70 [ 823.082592] ? rcu_read_lock_sched_held+0x110/0x130 [ 823.087620] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 823.093216] alloc_pages_current+0x107/0x210 [ 823.097658] push_pipe+0x3fc/0x7a0 [ 823.101212] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 823.106140] ? aa_file_perm+0x42e/0x1090 [ 823.110207] ? find_held_lock+0x35/0x120 [ 823.114287] ? iov_iter_revert+0xaa0/0xaa0 [ 823.118531] ? lock_downgrade+0x910/0x910 [ 823.122696] ? kasan_check_read+0x11/0x20 [ 823.126849] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 823.132136] ? rcu_read_unlock_special+0x380/0x380 [ 823.137075] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 823.142095] ? iov_iter_pipe+0xba/0x2f0 [ 823.146074] default_file_splice_read+0x1b1/0xac0 [ 823.150919] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 823.156462] ? aa_path_link+0x5d0/0x5d0 [ 823.160449] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 823.165731] ? iter_file_splice_write+0xfc0/0xfc0 [ 823.170571] ? add_lock_to_list.isra.0+0x450/0x450 [ 823.175508] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 823.181043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 823.186584] ? check_preemption_disabled+0x48/0x290 [ 823.191609] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 823.197147] ? fsnotify+0x4f5/0xed0 [ 823.200770] ? debug_mutex_init+0x2d/0x60 [ 823.204926] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 823.210464] ? __fsnotify_parent+0xe2/0x450 [ 823.214797] ? fsnotify_first_mark+0x350/0x350 [ 823.219413] ? apparmor_path_rmdir+0x30/0x30 [ 823.223841] ? alloc_pipe_info+0x286/0x580 [ 823.228095] ? security_file_permission+0x94/0x320 [ 823.233034] ? rw_verify_area+0x118/0x360 [ 823.237181] ? iter_file_splice_write+0xfc0/0xfc0 [ 823.242044] do_splice_to+0x12a/0x190 [ 823.245886] splice_direct_to_actor+0x31b/0x9d0 [ 823.250581] ? generic_pipe_buf_nosteal+0x10/0x10 [ 823.255433] ? do_splice_to+0x190/0x190 [ 823.259422] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 823.264958] ? rw_verify_area+0x118/0x360 [ 823.269112] do_splice_direct+0x2c7/0x420 [ 823.273276] ? splice_direct_to_actor+0x9d0/0x9d0 [ 823.278126] ? rcu_read_lock_sched_held+0x110/0x130 [ 823.283148] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 823.287899] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 823.293433] ? __sb_start_write+0x1ac/0x360 [ 823.297772] do_sendfile+0x61a/0xe60 [ 823.301513] ? do_compat_pwritev64+0x1c0/0x1c0 [ 823.306115] ? fput+0x128/0x1a0 [ 823.309413] ? do_syscall_64+0x8c/0x800 [ 823.313383] ? do_syscall_64+0x8c/0x800 [ 823.317360] __x64_sys_sendfile64+0x1f8/0x240 [ 823.321863] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 823.326444] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 823.331274] do_syscall_64+0x1a3/0x800 [ 823.335169] ? syscall_return_slowpath+0x5f0/0x5f0 [ 823.340103] ? prepare_exit_to_usermode+0x232/0x3b0 [ 823.345132] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 823.349988] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 823.355172] RIP: 0033:0x458099 [ 823.358398] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 823.377430] RSP: 002b:00007f3fd1906c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 823.385172] RAX: ffffffffffffffda RBX: 00007f3fd1906c90 RCX: 0000000000458099 [ 823.392436] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 823.399704] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 823.406967] R10: 0000000000000001 R11: 0000000000000246 R12: 00007f3fd19076d4 [ 823.414288] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000005 [ 823.468537] hfs: unable to load codepage "none" 12:07:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x5a) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000040)) socket$alg(0x26, 0x5, 0x0) sendto$inet6(r0, &(0x7f0000000180)='\a', 0x1, 0x0, 0x0, 0x0) [ 823.488962] hfs: unable to parse mount options [ 823.536183] hfs: unable to load codepage "none" [ 823.546052] hfs: unable to parse mount options 12:07:17 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x4, &(0x7f0000000340)=[{&(0x7f0000000080)="2f534acb0f8f5c2232115e2d21c2ac97610c665dc7a00aa73ec756369befc6dccb5b378991f78ab0d33cb60963", 0x2d, 0x3}, {&(0x7f00000000c0)="3e7fd499c3f09412b43ea738d4982aab66bfc76e97b259254b7c0e927e0a3572c413cc71b2bc411651f8e7c037dcc2f61d4752e07f7fdf7240d5f4e3d255df9c591fbdc040cead438eb0b14d4ad4b568679a49679a967b0eaf4accae4a29d578567cd0de07c2c0aaee3967abe322c51e6c9bc6b04f1c05844705de9f7bed20b711a14f09600048e4f3", 0x89, 0x6}, {&(0x7f0000000180)="eb90fb18c5d435dd238b7d5fe412bd811bf8b210e88b90cb7b76438c0743370df7a830de0b25456e54b351fe3e78dcd821b2b2848cc9234395f259a9a669dcc5505e1a8917e92dc57de83ce085e3ed60ee82769478b3819dfafe184adc3e9853fbc26c1582766825da04c49805a9157e8bb7a03b5e716262d1ac1f9cd32acbb06ba7ad2a5f933af30245fdef5fd13b908095713c685d7f5f13f7ae90b96750cf047f38e3ac361f89c0396310e30122e8e5f7e1e7190079fd", 0xb8, 0x6}, {&(0x7f0000000240)="87f4925423481884fc64bc7660c0c15b0fb7cfb8c141234935801d49c8323e7f0664ce4617939b6e8a36360834cd3ebcecbc38a51a94fa7762d4595f9d765b3e2cb57797a5e6c6cb9500fdd5a04fc6511f1d3cdf328acb206ffceb9ee7a092ff029c88bd3c6bf79754ee304ecd006bf84d7e4916c39df937f10115e577f50dc6a3bb25810c59fa3b3f56863c4f9bc9fff988b4c458c358985347c40a90ca38d4571856a3bdf5459d46dc251c1bd92800d9e1fc1de176b31134abfeff7605d2fbe2bf2fef01951e10", 0xc8, 0x100}], 0x20004, &(0x7f00000003c0)={[{@creator={'creator', 0x3d, '\fr-C'}}, {@file_umask={'file_umask', 0x3d, 0x2}}, {@quiet='quiet'}, {@dir_umask={'dir_umask', 0x3d, 0x6}}], [{@subj_user={'subj_user', 0x3d, 'codepage'}}, {@hash='hash'}]}) [ 823.704880] hfs: unable to load codepage "none" [ 823.721293] hfs: unable to parse mount options 12:07:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x5a) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000040)) sendto$inet6(r0, &(0x7f0000000180)='\a', 0x1, 0x0, 0x0, 0x0) [ 823.811536] hfs: unable to load codepage "none" [ 823.816239] hfs: unable to parse mount options [ 824.031205] hfs: unable to load codepage "none" [ 824.036008] hfs: unable to parse mount options [ 824.048752] IPVS: ftp: loaded support on port[0] = 21 [ 824.537461] chnl_net:caif_netlink_parms(): no params data found [ 824.569509] bridge0: port 1(bridge_slave_0) entered blocking state [ 824.575944] bridge0: port 1(bridge_slave_0) entered disabled state [ 824.583711] device bridge_slave_0 entered promiscuous mode [ 824.745066] bridge0: port 2(bridge_slave_1) entered blocking state [ 824.751734] bridge0: port 2(bridge_slave_1) entered disabled state [ 824.759220] device bridge_slave_1 entered promiscuous mode [ 824.776630] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 824.786534] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 824.967099] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 824.974891] team0: Port device team_slave_0 added [ 824.980666] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 824.987864] team0: Port device team_slave_1 added [ 824.993449] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 825.000758] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 825.061635] device hsr_slave_0 entered promiscuous mode [ 825.102599] device hsr_slave_1 entered promiscuous mode [ 825.315150] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 825.322414] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 825.336476] bridge0: port 2(bridge_slave_1) entered blocking state [ 825.342896] bridge0: port 2(bridge_slave_1) entered forwarding state [ 825.349622] bridge0: port 1(bridge_slave_0) entered blocking state [ 825.356001] bridge0: port 1(bridge_slave_0) entered forwarding state [ 825.538786] bridge0: port 1(bridge_slave_0) entered disabled state [ 825.546694] bridge0: port 2(bridge_slave_1) entered disabled state [ 825.739221] 8021q: adding VLAN 0 to HW filter on device bond0 [ 825.747321] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 825.755934] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 825.762142] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 825.769982] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 825.932258] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 825.938540] 8021q: adding VLAN 0 to HW filter on device team0 [ 825.947096] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 825.954261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 825.962197] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 825.970194] bridge0: port 1(bridge_slave_0) entered blocking state [ 825.976552] bridge0: port 1(bridge_slave_0) entered forwarding state [ 825.984635] IPVS: stopping backup sync thread 16373 ... [ 825.985931] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 826.001251] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 826.009641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 826.017975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 826.025681] bridge0: port 2(bridge_slave_1) entered blocking state [ 826.032071] bridge0: port 2(bridge_slave_1) entered forwarding state [ 826.039097] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 826.050727] device bridge_slave_1 left promiscuous mode [ 826.056462] bridge0: port 2(bridge_slave_1) entered disabled state [ 826.105823] device bridge_slave_0 left promiscuous mode [ 826.111461] bridge0: port 1(bridge_slave_0) entered disabled state [ 830.196368] bond1 (unregistering): Released all slaves [ 830.268825] device hsr_slave_1 left promiscuous mode [ 830.312070] device hsr_slave_0 left promiscuous mode [ 830.394006] team0 (unregistering): Port device team_slave_1 removed [ 830.408172] team0 (unregistering): Port device team_slave_0 removed [ 830.420464] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 830.453770] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 830.553113] bond0 (unregistering): Released all slaves [ 830.651218] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 830.659633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 830.671665] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 830.680585] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 830.688774] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 830.697125] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 830.707667] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 830.718363] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 830.729633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 830.743956] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 830.751632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 830.759339] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 830.769920] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 830.778920] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 830.789518] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 830.795877] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 830.802974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 830.811034] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 830.828729] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 830.850554] 8021q: adding VLAN 0 to HW filter on device batadv0 12:07:25 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000001c0)=0x4, 0x4) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(0xffffffffffffffff, 0xc0845658, &(0x7f00000000c0)={0x0, @bt={0x0, 0x0, 0x0, 0x0, 0x7}}) r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x15, 0x1, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x9, @local}, 0x10) getsockopt$inet_mreqsrc(r2, 0x0, 0x2f, &(0x7f0000000240)={@empty, @multicast2, @local}, &(0x7f0000000040)=0xfffffffffffffe7a) r5 = socket$inet(0x2, 0x80006, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r5, 0x0, 0x61, &(0x7f0000000440)={'filter\x00', 0x4}, 0x68) r6 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x40) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, 0x0, 0x0) r7 = dup(0xffffffffffffffff) accept$inet6(r2, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r6, 0x84, 0x21, 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) ioctl$KDGETLED(r7, 0x4b31, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, 0x0) 12:07:25 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x4800, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:07:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x5a) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400, 0x0) sendto$inet6(r0, &(0x7f0000000180)='\a', 0x1, 0x0, 0x0, 0x0) 12:07:25 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2080, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f00000000c0)={0xb9d08f9507619236}) 12:07:25 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) 12:07:25 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000040)=0x7ff) 12:07:25 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x2) 12:07:25 executing program 2: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x800, 0x0) syz_open_pts(r0, 0x200000) r1 = gettid() sched_setaffinity(r1, 0x97910a543b37c606, 0x0) r2 = socket$kcm(0x29, 0x40000a, 0x0) setsockopt$sock_void(r2, 0x1, 0x24, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x65f8000, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) syslog(0x9, &(0x7f0000000080)=""/193, 0xc1) [ 831.888920] hfs: unable to load codepage "none" [ 831.893827] hfs: unable to parse mount options [ 831.915781] hfs: unable to load codepage "none" [ 831.920476] hfs: unable to parse mount options 12:07:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x5a) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f0000000180)='\a', 0x1, 0x0, 0x0, 0x0) [ 832.112783] hfs: unable to load codepage "none" [ 832.113826] hfs: unable to load codepage "none" [ 832.120045] hfs: unable to parse mount options [ 832.128330] hfs: unable to parse mount options 12:07:26 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x3) 12:07:26 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000000)=""/193, 0xc1) r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x2, 0x4000c0) write$tun(r0, &(0x7f0000000140)={@val, @val={0x2, 0x0, 0x7f, 0x80, 0x5, 0x8000}, @x25={0x3, 0x325b, 0x0, "214deea8c89bdc5df1a7bc90b85d2b9c603ac78f28b1db48ecda49852b16b254482586e5053f33a6c152554e074a6b271da8a25a83675b86f967"}}, 0x4b) 12:07:26 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x100, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) sched_rr_get_interval(r0, &(0x7f0000000040)) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:07:26 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x4c00, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:07:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x5a) sendto$inet6(r0, &(0x7f0000000180)='\a', 0x1, 0x0, 0x0, 0x0) 12:07:26 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:07:26 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x4) 12:07:26 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000040)={@remote, @multicast1}, &(0x7f0000000080)=0xc) 12:07:26 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2a0102, 0x0) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000040)={0x4, 0x0, [{0x1, 0x7, 0x0, 0x0, @msi={0x0, 0x0, 0x8}}, {0x212, 0x3, 0x0, 0x0, @adapter={0x1, 0x5, 0x1000, 0x23, 0x10001}}, {0x80, 0x1, 0x0, 0x0, @msi={0xbc, 0xfa3b, 0x1ff}}, {0x9, 0x7, 0x0, 0x0, @adapter={0x9, 0x20, 0x0, 0x9, 0x800}}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) mount(&(0x7f0000000140)=@sg0='/dev/sg0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='rpc_pipefs\x00', 0x20010, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:07:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x5a) sendto$inet6(r0, &(0x7f0000000180)='\a', 0x1, 0x0, 0x0, 0x0) 12:07:26 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x5) [ 832.642984] hfs: unable to load codepage "none" [ 832.651268] hfs: unable to parse mount options [ 832.665616] hfs: unable to load codepage "none" [ 832.670423] hfs: unable to parse mount options [ 832.858096] hfs: unable to load codepage "none" [ 832.863232] hfs: unable to load codepage "none" [ 832.884406] hfs: unable to parse mount options 12:07:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x5a) sendto$inet6(r0, &(0x7f0000000180)='\a', 0x1, 0x0, 0x0, 0x0) 12:07:26 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x7) [ 832.914229] hfs: unable to parse mount options 12:07:26 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x200040) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000040)) mkdir(0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000002, 0x10010, r0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000080)={{{@in=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000001c0)={@rand_addr="f95cf9a5cdd587422a091d2597520d85", r2}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:07:26 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x200000000000000) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:07:27 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x6000, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:07:27 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)=ANY=[@ANYBLOB="636ff6706367653d6e6b6e652c2a"]) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 12:07:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f0000000180)='\a', 0x1, 0x0, 0x0, 0x0) 12:07:27 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x8) 12:07:27 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000180)={0x0, 0x3, 0x3, [0x6, 0x2, 0xfff]}, &(0x7f00000001c0)=0xe) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000200)={r1, 0x7}, &(0x7f0000000240)=0x8) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000014c0)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@initdev}}, &(0x7f00000015c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000037c0)={{{@in6=@empty, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f00000038c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000003940)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}}}, &(0x7f0000003a40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000003a80)={'team0\x00', 0x0}) getsockname$packet(r0, &(0x7f0000003ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003b00)=0x14) getsockname$packet(r0, &(0x7f0000003b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003b80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003c80)={{{@in6=@mcast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000003d80)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000003dc0)={0x0, @local, @multicast1}, &(0x7f0000003e00)=0xc) accept$packet(r0, &(0x7f0000003f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003f40)=0x14) accept(r0, &(0x7f0000003f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004000)=0x80) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000045c0)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000046c0)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000004700)={0x0, @loopback, @broadcast}, &(0x7f0000004740)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000004780)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000047c0)={{{@in=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f00000048c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000004900)={{{@in6=@remote, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000004a00)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000004e40)={'gre0\x00', 0x0}) accept4$packet(r0, &(0x7f0000004e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004ec0)=0x14, 0x800) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000006fc0)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f00000070c0)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000007140)={@broadcast, @broadcast, 0x0}, &(0x7f0000007180)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000071c0)={{{@in6=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f00000072c0)=0xe8) recvmmsg(r0, &(0x7f000000a840)=[{{0x0, 0x0, &(0x7f0000008380)=[{&(0x7f0000007300)=""/95, 0x5f}, {&(0x7f0000007380)=""/4096, 0x1000}], 0x2, &(0x7f00000083c0)=""/5, 0x5}, 0x10000}, {{&(0x7f0000008400)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10}, 0x80, &(0x7f0000009480)=[{&(0x7f0000008480)=""/4096, 0x1000}], 0x1, &(0x7f00000094c0)=""/248, 0xf8}, 0x80000000}, {{&(0x7f00000095c0)=@sco, 0x80, &(0x7f0000009900)=[{&(0x7f0000009640)=""/223, 0xdf}, {&(0x7f0000009740)=""/4, 0x4}, {&(0x7f0000009780)=""/148, 0x94}, {&(0x7f0000009840)}, {&(0x7f0000009880)=""/100, 0x64}], 0x5, &(0x7f0000009980)=""/82, 0x52}, 0x1}, {{&(0x7f0000009a00)=@caif=@util, 0x80, &(0x7f0000009e00)=[{&(0x7f0000009a80)=""/247, 0xf7}, {&(0x7f0000009b80)=""/112, 0x70}, {&(0x7f0000009c00)=""/5, 0x5}, {&(0x7f0000009c40)}, {&(0x7f0000009c80)=""/70, 0x46}, {&(0x7f0000009d00)=""/239, 0xef}], 0x6}, 0x4}, {{0x0, 0x0, &(0x7f000000a100)=[{&(0x7f0000009e80)=""/156, 0x9c}, {&(0x7f0000009f40)=""/225, 0xe1}, {&(0x7f000000a040)=""/140, 0x8c}], 0x3, &(0x7f000000a140)=""/231, 0xe7}, 0x5}, {{&(0x7f000000a240)=@un=@abs, 0x80, &(0x7f000000a540)=[{&(0x7f000000a2c0)=""/186, 0xba}, {&(0x7f000000a380)=""/164, 0xa4}, {&(0x7f000000a440)=""/1, 0x1}, {&(0x7f000000a480)=""/142, 0x8e}], 0x4, &(0x7f000000a580)=""/59, 0x3b}, 0x1000}, {{&(0x7f000000a5c0)=@ll={0x11, 0x0, 0x0}, 0x80, &(0x7f000000a740)=[{&(0x7f000000a640)=""/242, 0xf2}], 0x1, &(0x7f000000a780)=""/141, 0x8d}, 0x5}], 0x7, 0x40010041, &(0x7f000000aa00)={0x77359400}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f000000aa40)={{{@in=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f000000ab40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f000000abc0)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f000000acc0)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000ad00)={'ip_vti0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f000000ad40)={{{@in=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@empty}}, &(0x7f000000ae40)=0xe8) clock_gettime(0x0, &(0x7f000000d8c0)={0x0, 0x0}) recvmmsg(r0, &(0x7f000000d800)=[{{&(0x7f000000ae80)=@hci={0x1f, 0x0}, 0x80, &(0x7f000000c280)=[{&(0x7f000000af00)=""/103, 0x67}, {&(0x7f000000af80)=""/229, 0xe5}, {&(0x7f000000b080)=""/235, 0xeb}, {&(0x7f000000b180)=""/208, 0xd0}, {&(0x7f000000b280)=""/4096, 0x1000}], 0x5}, 0x4}, {{&(0x7f000000c300)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f000000c540)=[{&(0x7f000000c380)=""/191, 0xbf}, {&(0x7f000000c440)=""/255, 0xff}], 0x2}, 0x1000}, {{0x0, 0x0, &(0x7f000000d6c0)=[{&(0x7f000000c580)=""/4096, 0x1000}, {&(0x7f000000d580)=""/206, 0xce}, {&(0x7f000000d680)=""/17, 0x11}], 0x3, &(0x7f000000d700)=""/210, 0xd2}, 0x128}], 0x3, 0x40000000, &(0x7f000000d900)={r28, r29+10000000}) getpeername$packet(r0, &(0x7f000000d940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000d980)=0x14) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f000000e400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400100}, 0xc, &(0x7f000000e3c0)={&(0x7f000000d9c0)={0x9ec, r2, 0x20, 0x70bd28, 0x25dfdbfd, {}, [{{0x8, 0x1, r3}, {0x174, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfa}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffff9}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}]}}, {{0x8, 0x1, r8}, {0x258, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x6d0}}, {0x8, 0x6, r11}}}, {0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x34, 0x4, [{0x101, 0x0, 0x1, 0x10001}, {0x10001, 0x8, 0x3, 0x6}, {0x5, 0x5b0, 0x7, 0x40}, {0x1ff, 0x3b, 0x8, 0x3}, {0x2, 0x7f, 0x9, 0xfffffffffffffffd}, {0x1e1, 0x9e, 0xfffffffffffffff9, 0x8001}]}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffe}}, {0x8, 0x6, r12}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x2458}}, {0x8}}}]}}, {{0x8, 0x1, r14}, {0x100, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7ff}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x4000000000000000, 0x8, 0x1, 0xffffffffffffffff}, {0x5, 0x8, 0xfffffffffffffffc, 0x2}, {0x9, 0x81, 0x200, 0x81}]}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r15}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x86}}, {0x8, 0x6, r16}}}]}}, {{0x8, 0x1, r17}, {0x78, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r19}, {0x168, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r21}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x1f6e}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r22}}}]}}, {{0x8, 0x1, r23}, {0xc4, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r24}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x2000000000}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r25}}, {0x8}}}]}}, {{0x8, 0x1, r26}, {0x108, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r27}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r30}, {0x120, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x34, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r31}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}]}, 0x9ec}, 0x1, 0x0, 0x0, 0x48000}, 0x24044084) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000140)=0xe8) r33 = syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000004c0)={0x0, @initdev, @loopback}, &(0x7f0000000500)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x801}, 0xc, &(0x7f0000000540)={&(0x7f0000000a40)={0x93c, r33, 0x412, 0x70bd2c, 0x25dfdbfb, {}, [{{0x8, 0x1, r32}, {0x1e0, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xe119}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x21, 0xffffffffffff4fcd, 0x3, 0xfffffffffffffff9}, {0x4, 0x7, 0x3ff, 0x78}]}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r32}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r32}}}]}}, {{0x8, 0x1, r32}, {0x1cc, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x360000000000}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x34, 0x4, [{0xa0, 0x6, 0x233, 0x5}, {0x10000, 0x100, 0x5, 0x8000}, {0x0, 0x6, 0x4, 0x3}, {0x1, 0x7c63764f, 0x5, 0x80000000}, {0x7fffffff, 0xffffffff, 0xb2, 0x7fff}, {0x1cfb, 0x7, 0x29dd, 0x40}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x51}}, {0x8, 0x6, r32}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r32}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r32}, {0x1ac, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r32}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x3f}}, {0x8, 0x6, r32}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000000}}, {0x8, 0x6, r32}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r32}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r32}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r32}}}]}}, {{0x8, 0x1, r32}, {0xb0, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r34}}}]}}, {{0x8, 0x1, r32}, {0xc0, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r32}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x8, 0xc897, 0xfff, 0x100000000}, {0x5, 0xf9cb855, 0x6, 0x401}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x20000000000000}}, {0x8, 0x6, r32}}}]}}, {{0x8, 0x1, r32}, {0x174, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r32}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r32}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7fff}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x17}}}]}}, {{0x8, 0x1, r32}, {0xb4, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x100000000}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xad}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r32}}, {0x8}}}]}}]}, 0x93c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 833.349205] hfs: unable to parse mount options 12:07:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f0000000180)='\a', 0x1, 0x0, 0x0, 0x0) 12:07:27 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x6800, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:07:27 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x9) 12:07:27 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = geteuid() r1 = getegid() r2 = socket$inet6(0xa, 0x4, 0x8000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=0x0, &(0x7f0000000100)=0x4) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000140)={r3, 0x8}, &(0x7f00000001c0)=0x8) chown(&(0x7f0000000080)='./file0\x00', r0, r1) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x800, 0x0) ioctl$CAPI_GET_FLAGS(r4, 0x80044323, &(0x7f0000000040)) execveat(r4, &(0x7f0000000180)='./file1\x00', &(0x7f00000004c0)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='\x00', &(0x7f00000002c0)='keyringlo-\x00', &(0x7f0000000300)='em1system!\x00', &(0x7f0000000340)='vmnet0\x00', &(0x7f0000000380)='}[bdev@[ppp0\x00', &(0x7f00000003c0)='GPL\x00', &(0x7f0000000400)='/proc/capi/capi20ncci\x00'], &(0x7f0000000640)=[&(0x7f0000000440)='/proc/capi/capi20ncci\x00', &(0x7f0000000540)='\x0euser\x00', &(0x7f0000000580)='security+\x00', &(0x7f00000005c0)='/proc/capi/capi20ncci\x00', &(0x7f0000000600)='/proc/capi/capi20ncci\x00'], 0x0) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 833.474739] hfs: unable to parse mount options 12:07:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f0000000180)='\a', 0x1, 0x0, 0x0, 0x0) 12:07:27 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0xfd31, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="40606515c5d8450b2ee10da2df2f27293b72f29c82eb8a84cd8a2cf836bcdfc524eea288b9f050cb678c48851119bc1fb2235e1036f88211db2806bc2166e7fcfd3deee2ab1c9571b47ccab961a5ae1864cc754b5638de809df0314613fe68f2ecf710300a8bcc96713158d06584a03b0a6c4d3573bfdbdb24a9ed142847bf3c1f1cd88099166b80ab06258632db897846ab52a71efbae"]) openat$nullb(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nullb0\x00', 0x482080, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x40c0, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000200)=""/51, &(0x7f0000000240)=0x33) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) getsockname$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10) 12:07:27 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x501, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7, 0x240001) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000040)=0xfffffffffffffff7, 0x4) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)=0x0) sched_setattr(r2, &(0x7f0000000100)={0x30, 0x0, 0x1, 0xffffffff, 0x9, 0x0, 0x1, 0x3}, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:07:27 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0xa) 12:07:27 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x73f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000003e00)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000003d00)=[{{&(0x7f0000000000)=@sco, 0x80, &(0x7f0000000080)=[{&(0x7f0000000200)=""/211, 0xd3}], 0x1}, 0x3}, {{&(0x7f0000000300)=@generic, 0x80, &(0x7f0000001600)=[{&(0x7f0000000380)=""/113, 0x71}, {&(0x7f0000000400)=""/77, 0x4d}, {&(0x7f00000004c0)=""/220, 0xdc}, {&(0x7f00000000c0)=""/57, 0x39}, {&(0x7f00000005c0)=""/17, 0x11}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x6, &(0x7f0000001680)=""/213, 0xd5}, 0xc0000000000000}, {{&(0x7f0000001780)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000001ac0)=[{&(0x7f0000001800)=""/49, 0x31}, {&(0x7f0000001840)=""/199, 0xc7}, {&(0x7f0000001940)=""/193, 0xc1}, {&(0x7f0000001a40)=""/88, 0x58}], 0x4, &(0x7f0000001b00)=""/165, 0xa5}, 0x6}, {{&(0x7f0000001bc0)=@generic, 0x80, &(0x7f0000003c40)=[{&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000002c40)=""/4096, 0x1000}], 0x2, &(0x7f0000003c80)=""/101, 0x65}, 0x5b}], 0x4, 0x10000, &(0x7f0000003e40)={r1, r2+10000000}) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) syslog(0x3, &(0x7f0000000100)=""/193, 0x7) [ 833.741171] Unknown ioctl 21519 12:07:27 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x6c00, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:07:27 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='caif0\x00') 12:07:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x5a) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f0000000180)='\a', 0x1, 0x0, 0x0, 0x0) [ 833.825781] Unknown ioctl 21519 12:07:27 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget(0x2, 0x400000, 0x0, &(0x7f0000bff000/0x400000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000200)=""/228) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:07:27 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0xf) 12:07:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x5a) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f0000000180)='\a', 0x1, 0x0, 0x0, 0x0) 12:07:28 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x7400, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) [ 834.122742] hfs: unable to load codepage "none" [ 834.136612] hfs: unable to parse mount options 12:07:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x5a) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f0000000180)='\a', 0x1, 0x0, 0x0, 0x0) 12:07:28 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x10) 12:07:28 executing program 2: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) sched_setaffinity(r0, 0x11b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) [ 834.302015] hfs: unable to load codepage "none" [ 834.310440] hfs: unable to parse mount options 12:07:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff"], 0x0) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x5a) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f0000000180)='\a', 0x1, 0x0, 0x0, 0x0) 12:07:28 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x111400) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000040)={0x6, 0x2}) socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) 12:07:28 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x14) 12:07:28 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)=ANY=[@ANYBLOB="636f1dd037cb8300ded96f6e652c00"]) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x200000, 0x0) connect$rds(r0, &(0x7f0000000040)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) 12:07:28 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x7a00, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:07:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff"], 0x0) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x5a) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f0000000180)='\a', 0x1, 0x0, 0x0, 0x0) 12:07:28 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xc1) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x40000, 0x0) [ 834.804074] hfs: unable to parse mount options 12:07:28 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x300) 12:07:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff"], 0x0) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x5a) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f0000000180)='\a', 0x1, 0x0, 0x0, 0x0) 12:07:28 executing program 2: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000940)=""/193, 0xfffffffffffffed7) 12:07:29 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) process_vm_readv(0x0, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xd04b, 0x129180) ioctl$SIOCNRDECOBS(r1, 0x89e2) syslog(0x4, &(0x7f0000000940)=""/193, 0xc1) 12:07:29 executing program 5: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) setitimer(0x1, &(0x7f0000000000)={{}, {0x0, 0x2710}}, 0x0) 12:07:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffffffffffffffffff"], 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x5a) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000040)) sendto$inet6(r0, &(0x7f0000000180)='\a', 0x1, 0x0, 0x0, 0x0) 12:07:29 executing program 0: syz_mount_image$hfs(&(0x7f0000001900)='hfs\x00', &(0x7f0000001940)='./file0\x00', 0x0, 0x0, 0x0, 0xedc0, &(0x7f0000001b80)={[{@codepage={'codepage', 0x3d, 'none'}}]}) 12:07:29 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x402) 12:07:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x5a) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f0000000180)='\a', 0x1, 0x0, 0x0, 0x0) [ 835.228498] hfs: unable to load codepage "none" [ 835.263254] hfs: unable to parse mount options [ 835.299486] ================================================================== [ 835.307191] BUG: KASAN: use-after-free in generic_gcmaes_encrypt+0xc8/0x1a0 [ 835.307207] Read of size 12 at addr ffff8880a4762cc0 by task kworker/1:0/29724 [ 835.307214] [ 835.323286] CPU: 1 PID: 29724 Comm: kworker/1:0 Not tainted 5.0.0-rc2+ #31 [ 835.330299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 835.339699] Workqueue: pencrypt padata_parallel_worker [ 835.339709] Call Trace: [ 835.339729] dump_stack+0x1db/0x2d0 [ 835.339748] ? dump_stack_print_info.cold+0x20/0x20 [ 835.339769] ? __lock_acquire+0x572/0x4a30 [ 835.360512] ? generic_gcmaes_encrypt+0xc8/0x1a0 [ 835.365301] print_address_description.cold+0x7c/0x20d [ 835.370587] ? generic_gcmaes_encrypt+0xc8/0x1a0 [ 835.375361] ? generic_gcmaes_encrypt+0xc8/0x1a0 [ 835.380139] kasan_report.cold+0x1b/0x40 [ 835.384210] ? generic_gcmaes_encrypt+0xc8/0x1a0 [ 835.388983] check_memory_region+0x123/0x190 [ 835.393407] memcpy+0x24/0x50 [ 835.396542] generic_gcmaes_encrypt+0xc8/0x1a0 [ 835.401131] ? helper_rfc4106_encrypt+0x490/0x490 [ 835.406023] ? cryptd_ahash_queued+0x150/0x150 [ 835.410613] ? kasan_check_read+0x11/0x20 [ 835.414767] ? do_raw_spin_unlock+0xa0/0x330 [ 835.419186] gcmaes_wrapper_encrypt+0x15d/0x200 [ 835.423862] pcrypt_aead_enc+0xc7/0x190 [ 835.427840] padata_parallel_worker+0x47f/0x7c0 [ 835.432523] ? padata_do_parallel+0x8d0/0x8d0 [ 835.437030] ? __lock_is_held+0xb6/0x140 [ 835.441111] process_one_work+0xd0c/0x1ce0 [ 835.445383] ? preempt_notifier_register+0x200/0x200 [ 835.450498] ? __switch_to_asm+0x34/0x70 [ 835.454594] ? pwq_dec_nr_in_flight+0x4a0/0x4a0 [ 835.459272] ? pci_mmcfg_check_reserved+0x170/0x170 [ 835.464291] ? worker_thread+0x3b7/0x14a0 [ 835.468451] ? find_held_lock+0x35/0x120 [ 835.472538] ? lock_acquire+0x1db/0x570 [ 835.476521] ? worker_thread+0x3cd/0x14a0 [ 835.480675] ? kasan_check_read+0x11/0x20 [ 835.484823] ? do_raw_spin_lock+0x156/0x360 [ 835.489142] ? lock_release+0xc40/0xc40 [ 835.493121] ? rwlock_bug.part.0+0x90/0x90 [ 835.497360] ? trace_hardirqs_on_caller+0x310/0x310 [ 835.502412] worker_thread+0x143/0x14a0 [ 835.506404] ? process_one_work+0x1ce0/0x1ce0 [ 835.510915] ? __kthread_parkme+0xc3/0x1b0 [ 835.515150] ? lock_acquire+0x1db/0x570 [ 835.519128] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 835.524231] ? lockdep_hardirqs_on+0x415/0x5d0 [ 835.528827] ? trace_hardirqs_on+0xbd/0x310 [ 835.533148] ? __kthread_parkme+0xc3/0x1b0 [ 835.537404] ? trace_hardirqs_off_caller+0x300/0x300 [ 835.542510] ? do_raw_spin_trylock+0x270/0x270 [ 835.547092] ? schedule+0x108/0x350 [ 835.550730] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 835.555848] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 835.561387] ? __kthread_parkme+0xfb/0x1b0 [ 835.565625] kthread+0x357/0x430 [ 835.568992] ? process_one_work+0x1ce0/0x1ce0 [ 835.573486] ? kthread_stop+0x920/0x920 [ 835.577475] ret_from_fork+0x3a/0x50 [ 835.581203] [ 835.582829] Allocated by task 6514: [ 835.586455] save_stack+0x45/0xd0 [ 835.589909] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 835.594849] kasan_kmalloc+0x9/0x10 [ 835.598530] kmem_cache_alloc_trace+0x151/0x760 [ 835.603266] tls_set_sw_offload+0xdf7/0x1330 [ 835.607676] tls_setsockopt+0x687/0x770 [ 835.611647] sock_common_setsockopt+0x9a/0xe0 [ 835.616288] __sys_setsockopt+0x1b0/0x3a0 [ 835.620433] __x64_sys_setsockopt+0xbe/0x150 [ 835.624844] do_syscall_64+0x1a3/0x800 [ 835.628783] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 835.633961] [ 835.635582] Freed by task 6511: [ 835.638860] save_stack+0x45/0xd0 [ 835.642324] __kasan_slab_free+0x102/0x150 [ 835.646559] kasan_slab_free+0xe/0x10 [ 835.650360] kfree+0xcf/0x230 [ 835.653464] tls_sk_proto_close+0x612/0x770 [ 835.657833] inet_release+0x105/0x1f0 [ 835.661680] inet6_release+0x53/0x80 [ 835.665395] __sock_release+0xd3/0x250 [ 835.669280] sock_close+0x1b/0x30 [ 835.672747] __fput+0x3c5/0xb10 [ 835.676023] ____fput+0x16/0x20 [ 835.679296] task_work_run+0x1f4/0x2b0 [ 835.683182] exit_to_usermode_loop+0x32a/0x3b0 [ 835.687764] do_syscall_64+0x696/0x800 [ 835.691651] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 835.696831] [ 835.698458] The buggy address belongs to the object at ffff8880a4762cc0 [ 835.698458] which belongs to the cache kmalloc-32 of size 32 [ 835.710945] The buggy address is located 0 bytes inside of [ 835.710945] 32-byte region [ffff8880a4762cc0, ffff8880a4762ce0) [ 835.722548] The buggy address belongs to the page: [ 835.727475] page:ffffea000291d880 count:1 mapcount:0 mapping:ffff88812c3f01c0 index:0xffff8880a4762fc1 [ 835.736922] flags: 0x1fffc0000000200(slab) [ 835.741160] raw: 01fffc0000000200 ffffea000280fec8 ffffea0002955f08 ffff88812c3f01c0 [ 835.749551] raw: ffff8880a4762fc1 ffff8880a4762000 000000010000003f 0000000000000000 [ 835.757425] page dumped because: kasan: bad access detected [ 835.763131] [ 835.764761] Memory state around the buggy address: [ 835.769683] ffff8880a4762b80: 06 fc fc fc fc fc fc fc 06 fc fc fc fc fc fc fc [ 835.777053] ffff8880a4762c00: 05 fc fc fc fc fc fc fc 00 01 fc fc fc fc fc fc [ 835.784412] >ffff8880a4762c80: 06 fc fc fc fc fc fc fc fb fb fb fb fc fc fc fc [ 835.791767] ^ [ 835.797216] ffff8880a4762d00: 06 fc fc fc fc fc fc fc 06 fc fc fc fc fc fc fc [ 835.804574] ffff8880a4762d80: 06 fc fc fc fc fc fc fc 05 fc fc fc fc fc fc fc [ 835.811935] ================================================================== [ 835.819300] Disabling lock debugging due to kernel taint [ 835.824825] Kernel panic - not syncing: panic_on_warn set ... [ 835.830729] CPU: 1 PID: 29724 Comm: kworker/1:0 Tainted: G B 5.0.0-rc2+ #31 [ 835.839123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 835.848500] Workqueue: pencrypt padata_parallel_worker [ 835.853786] Call Trace: [ 835.856387] dump_stack+0x1db/0x2d0 [ 835.860018] ? dump_stack_print_info.cold+0x20/0x20 [ 835.865093] panic+0x2cb/0x65c [ 835.868290] ? add_taint.cold+0x16/0x16 [ 835.872258] ? retint_kernel+0x2d/0x2d [ 835.876148] ? trace_hardirqs_on+0xb4/0x310 [ 835.880473] ? generic_gcmaes_encrypt+0xc8/0x1a0 [ 835.885235] end_report+0x47/0x4f [ 835.888692] ? generic_gcmaes_encrypt+0xc8/0x1a0 [ 835.893459] kasan_report.cold+0xe/0x40 [ 835.897438] ? generic_gcmaes_encrypt+0xc8/0x1a0 [ 835.902194] check_memory_region+0x123/0x190 [ 835.906600] memcpy+0x24/0x50 [ 835.909733] generic_gcmaes_encrypt+0xc8/0x1a0 [ 835.914315] ? helper_rfc4106_encrypt+0x490/0x490 [ 835.919155] ? cryptd_ahash_queued+0x150/0x150 [ 835.923735] ? kasan_check_read+0x11/0x20 [ 835.927879] ? do_raw_spin_unlock+0xa0/0x330 [ 835.932293] gcmaes_wrapper_encrypt+0x15d/0x200 [ 835.936961] pcrypt_aead_enc+0xc7/0x190 [ 835.940931] padata_parallel_worker+0x47f/0x7c0 [ 835.945606] ? padata_do_parallel+0x8d0/0x8d0 [ 835.950101] ? __lock_is_held+0xb6/0x140 [ 835.954170] process_one_work+0xd0c/0x1ce0 [ 835.958403] ? preempt_notifier_register+0x200/0x200 [ 835.963512] ? __switch_to_asm+0x34/0x70 [ 835.967582] ? pwq_dec_nr_in_flight+0x4a0/0x4a0 [ 835.972255] ? pci_mmcfg_check_reserved+0x170/0x170 [ 835.977270] ? worker_thread+0x3b7/0x14a0 [ 835.981417] ? find_held_lock+0x35/0x120 [ 835.985484] ? lock_acquire+0x1db/0x570 [ 835.989468] ? worker_thread+0x3cd/0x14a0 [ 835.993623] ? kasan_check_read+0x11/0x20 [ 835.997769] ? do_raw_spin_lock+0x156/0x360 [ 836.002088] ? lock_release+0xc40/0xc40 [ 836.006063] ? rwlock_bug.part.0+0x90/0x90 [ 836.010298] ? trace_hardirqs_on_caller+0x310/0x310 [ 836.015326] worker_thread+0x143/0x14a0 [ 836.019315] ? process_one_work+0x1ce0/0x1ce0 [ 836.023811] ? __kthread_parkme+0xc3/0x1b0 [ 836.028045] ? lock_acquire+0x1db/0x570 [ 836.032017] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 836.037118] ? lockdep_hardirqs_on+0x415/0x5d0 [ 836.041700] ? trace_hardirqs_on+0xbd/0x310 [ 836.046021] ? __kthread_parkme+0xc3/0x1b0 [ 836.050253] ? trace_hardirqs_off_caller+0x300/0x300 [ 836.055359] ? do_raw_spin_trylock+0x270/0x270 [ 836.059941] ? schedule+0x108/0x350 [ 836.063572] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 836.068674] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 836.074210] ? __kthread_parkme+0xfb/0x1b0 [ 836.078441] kthread+0x357/0x430 [ 836.081807] ? process_one_work+0x1ce0/0x1ce0 [ 836.086296] ? kthread_stop+0x920/0x920 [ 836.090268] ret_from_fork+0x3a/0x50 [ 836.094970] Kernel Offset: disabled [ 836.098596] Rebooting in 86400 seconds..